In the wake of recent high-profile security incidents, I started wondering: what, generally speaking, should an organization's security priorities be? That is, given a finite budget - and everyone's budget is finite - what should you do first? More precisely, what security practices or features will give you the most protection per zorkmid? I suggested two of my own, and then asked my infosec-heavy Twitter feed for suggestions. more
I've worked with a number of small communities that want to explore the idea of having a community-owned ISP. My advice to small communities is the same as with all clients - economy-of-scale really matters for ISPs. Economy-of-scale is the economic term for describing how businesses get more efficient as they get larger. It's fairly easy to understand, and the classic example is to look at the impact of the salary and costs of the general manager of an ISP. more
Rodney Joffe, Senior Technologist at Neustar, explaines that vehicles (beginning with 1998 models) are vulnerable to hacking, but manufacturers have been unable to fix the problem. In the video below, Joffe explains the challenge to cars and the possible threats that exist for other machines connected to a network. more
Ren Zhengfei tells the Economist and the NY Times he is prepared to give the US essentially everything the President has asked, including the crown jewels: the complete design and source code of Huawei's 5G system. Ren would "license the entire Huawei 5G platform to any American company that wants to manufacture it and install it and operate it, completely independent of Huawei." more
Part 2: How do I choose the right option for my brand? In my previous article, I discussed the question of how to represent .brand domains in advertising. As you can imagine, it's a balancing act -- stimulating awareness of the domain, creating the desired customer behavior of the future using .brands, whilst ensuring that we are considerate to the fact that .brands are yet to hit mainstream awareness. Sounds simple right? more
If you operate an Internet Exchange Point (IXP) or are interested in creating one, the Internet Society has a “Sustainable Peering Infrastructure” funding program that is open for applications until this Friday, September 6, 2024... Grant funds from USD $5,000 up to $50,000 are open to all regions and are available to assist in equipment purchases (switches, optic modules, servers, and routers), training, capacity building, and community development. more
The Information Technology Industry Council (ITI) published a recent report that looks at "5G policy Principles and 5G Essentials for Global Policymakers." For those who don't know ITI, they are a DC-based lobbying group that represents most of heavy-hitter tech firms, and which works to help shape policy on tax, trade, talent, security, access, and sustainability issues. I don't think I've seen another document that so clearly outlines the hopes of the big US cellular companies. more
With companies realizing the threat of hefty fines, lawsuits, and executive resignations that can follow security breaches, companies are scrambling to scoop up scarce security experts. more
The international community is converging on one notion at least: that Facebook cannot be prosecutor, judge and jury of its own achievements and transgressions. The calls to regulate social media companies first came from various legislative bodies, then from civil society and national policymakers, then from the CEO of Facebook itself, "to preserve what is best about [the Internet]." If some scepticism followed that was natural enough – was the company sincere in calling for more regulation? more
According to a report by the Defense Science Board, the President-elect Barack Obama will inherit a cybersecurity infrastructure that is ill-prepared for advanced cyberattacks which will be of particular challenge for the new leaders... Reporting today on eWeek, Roy Mark writes: "The Bush administration has been widely criticized by security experts as de-emphasizing cyber-security and hamstringing the authority of officials in charge of government-wide cyber-security" said Roy Mark in a report eWeek." more
A national-level cybersecurity industrial park is under development in Beijing, China to boost the industry and tap into the potential of domestic tech companies. more
A German appeals court has held a German domain name registrar (Key Systems) responsible for issuing a domain name to H33t, a torrent-tracking site. The case was appealed, but the appeals court upheld the lower court ruling. more
Understandably, just now new gTLDs are uppermost in the minds of people in the domain name business. For the general Internet user, some other issues retain their crucial importance: upholding the global public interest, enhancing governance within ICANN and beyond, making the Multi-Stakeholder Model (MSM) truly efficient, sustainable, and equitable. "Making ICANN Relevant, Responsive and Respected" ("R3") sets out to identify the main challenges facing the Internet community, especially in ICANN, and offers recommendations in each of the areas explored. more
Starlink expanded to 42 new countries in 2025, added 2.7 million customers, improved network speeds and latency, and continued satellite launches as it nears its first-phase constellation goal of 12,000 satellites. more
The ICANN Board meeting undertaken recently in Nairobi was indeed eventful and there were many vital topics on the agenda, in particular for the new gTLD program that kept many interested parties on the edges of their seats as the meeting unfolded. ... One of the more controversial decisions was in regard to the Expression of Interest (EOI), a program intended to allow potential new gTLD applicants to pre-register for their desired TLD and provide ICANN and the community with invaluable information regarding likely volumes of applications. more