As DDoS attacks become larger, more frequent and complex, being able to stop them is a must. While doing this is part science, a matter of deploying technology, there is also an art to repelling sophisticated attacks. Arbor Networks, Citrix and others make great gear, but there's no magic box that will solve all your problems for you. Human expertise will always be a crucial ingredient. more
On June 3, 2020, EURid, the registry for .EU domains, published its timeline and action plan to withdraw and delete .EU domains registered to entities and individuals located in the U.K. ... Following the .EU regulations that were published on March 29, 2019, registrations of .EU domain names may be held by EU citizens, citizens of Iceland, Liechtenstein, and Norway, independent of their place of residence -- as well as organizations that are established in the EU. more
The Biden administration has announced an executive order that would ban U.S. federal agencies from using commercially developed spyware that poses threats to human rights and national security. more
We could see it as a victory for those advocating changes and adjustments in the system of internet governance. Au contraire... we could consider it as the debacle of the good intentions... all ending up in not knowing if it was worth it. I say and maintain, that the effort and the earned contributions were worth it. The final result is that ICANN should be strengthened to recognize its merits and achievements, not underestimate what this organization has accomplished in fifteen years of hard and continuous work. more
Pakistan's National Assembly on Thursday passed the controversial cybercrime bill through a majority vote that prescribes a maximum penalty of 14 years in jail and 5 million rupees in fine for cyber-terrorism. more
WikiLeaks' newly released Vault 7 trove is a tantalizing study in how one of the world's premiere intelligence agencies hacks devices. Analysts and experts have signaled that this leak appears authentic based on some clues in the content. But while it may ultimately be comparable in size to the Snowden or Manning leaks, it lacks the "wow" factor that made those landmark whistleblowing cases so important. What lessons are to be learned from the leaks, and how should we apply them to our personal digital lives? more
"Handover of US internet control to ICANN now officially blocked by Republican policy," Kieren McCarthy reporting today in The Register: "The planned transition of the internet's critical technical functions from the US government to a technical body may come under further attack after the Republican Party officially agreed to block it on Monday. more
Non-Commercial Stakeholder Group (NCSG) today released the following statement on ICANN staff's accountability plan... "A number of public comments and discussions in London focused on the inherent conflict of interest behind staff developing its own accountability and transparency mechanisms, so it was surprising to see that input had not been taken into account in the development of this proposal..." more
While the media spotlights the US role in Internet governance, the NTAG Executive Committee has been focussed on the daily business of ensuring the New gTLD programme is moving forward in the best interests of applicants. There are signs that ICANN is becoming more responsive to applicant needs. Quick action implementing GAC Advice once it was resolved by the New gTLD Program Committee, the recent name collision webinar, and an ongoing dialogue on new gTLD auctions procedures are all positive steps. more
Google, which through its Postini email security and archiving service processes over 3 billion email connections a day, reports that despite recent series of major botnet takedowns, spam levels during the first quarter of 2010 have held fairly steady. "This suggests that there's no shortage of botnets out there for spammers to use. If one botnet goes offline, spammers simply buy, rent, or deploy another, making it difficult for the anti-spam community to make significant inroads in the fight against spam with individual botnet takedowns." more
The U.S. Department of Homeland Security has issued a warning about cybersecurity vulnerabilities in medical devices which have come after independent researchers, or the companies themselves, reporting the problems. more
Over the past two weeks Andrew Lerner, Vice President in Gartner Research covering enterprise networking products, has put out two successive blogs that raise really interesting questions about the changing world of network management in an increasingly cloud-centric world. In "What Keeps Network Folks Up at Night?", Andrew writes about the worrisome challenges in the Banking/Financial industry related to frequent manual network configuration errors. more
Much of rural America with very low population density, depends on small wireless carriers for their internet access as AT&T, T-Mobile and other large providers have no interest in providing services. more
Unless you have a team employing the latest proactive threat-hunting techniques, the stealthy Advanced Persistent Threat (APT) hiding in your network can pass by completely unnoticed. There are as many definitions of APT as experts writing about the topic, so let's boil it down to the simple essentials: APTs are usually implanted and maintained by a team of malicious actors with the intention of living long term in your network while extracting valuable private information. more
It is becoming clear that the broadband market is reaching maturity. This is already causing havoc in the industry for ISPs that relied on year-over-year customer growth to prop up stock prices. Earlier this year, the New Street Research, a company that specializes in research in the telecommunications and technology sectors, said that it estimated that new broadband customers would grow by about 1 million this year. more