/ Most Viewed

Stargate Expands: OpenAI and Partners Unveil Massive AI Infrastructure Push Across the U.S.

OpenAI, Oracle, and SoftBank have announced five new data centers as part of their $500 billion Stargate initiative. This privately funded project aims to expand AI infrastructure across the United States. more

The Changing World of Network Management in an Increasingly Cloud-Centric World

Over the past two weeks Andrew Lerner, Vice President in Gartner Research covering enterprise networking products, has put out two successive blogs that raise really interesting questions about the changing world of network management in an increasingly cloud-centric world. In "What Keeps Network Folks Up at Night?", Andrew writes about the worrisome challenges in the Banking/Financial industry related to frequent manual network configuration errors. more

Hot Take on the Twitter Hack

If you read this blog, you've probably heard by now about the massive Twitter hack. Briefly, many high-profile accounts were taken over and used to tweet scam requests to send Bitcoins to a particular wallet, with the promise of double your money back. Because some of the parties hit are sophisticated and security-aware, it seems unlikely that the attack was a straightforward one directly on these accounts. more

FCC Declines Emergency Briefing Request Concerning Location Data Collection

U.S. Federal Communications Commission (FCC) chairman Ajit Pai declined a top House Democrat's request for an emergency briefing on the wireless industry's data collection practices amid troubling reports about the availability of real-time location information, reports Harper Neidig in The Hill. more

NTAG Chair Blog: Singapore Mid-term Update

While the media spotlights the US role in Internet governance, the NTAG Executive Committee has been focussed on the daily business of ensuring the New gTLD programme is moving forward in the best interests of applicants. There are signs that ICANN is becoming more responsive to applicant needs. Quick action implementing GAC Advice once it was resolved by the New gTLD Program Committee, the recent name collision webinar, and an ongoing dialogue on new gTLD auctions procedures are all positive steps. more

ICANN Postpones 52nd Meeting in Marrakech Due of Ebola

Morocco World News reports today that ICANN has decided to postpone its 52 meeting initially scheduled to take place in Marrakech. The meeting was due to be held in Morocco’s main tourist destination on February 8-12 however, according to sources, the postponing decision was made by the organization due to the spread of the Ebola virus and after the Moroccan government stressed the need to avoid organizing major gatherings of people coming from different countries. more

Controversy Looms as Pakistan Passes Cybercrime Law, Critics Say Violates Human Rights

Pakistan's National Assembly on Thursday passed the controversial cybercrime bill through a majority vote that prescribes a maximum penalty of 14 years in jail and 5 million rupees in fine for cyber-terrorism. more

Performance Test White Paper for SDN Controller Issued

Recently, BII-Global SDN Certified Testing Center (SDNCTC EN | CH) issued the Performance Test White Paper for SDN Controller (hereinafter Whitepaper) at China Future Network and Development Innovation Forum, which truly fills the vacuum in SDN controller performance testing at home. It, by means of elaborate results from the open-source controller tests, provides reliable analysis report to all corners within the industry, which has been highly thought of and widely supported by experts both at home and broad. more

Hurricane Sandy Had Surprising Impact on Global Internet Traffic Flow

In addition to knocking out power and Internet connectivity in a significant part of the New York metropolitan area, Sandy also had a surprising impact on the world's Internet traffic, traffic that neither originated from nor was destined to areas effected by the storm, Renesys reports. "From locations around the globe as varied as Chile, Sweden and India, some Internet traffic was forced onto alternate paths, avoiding failures at critical transit points in the NYC area." more

New Cyber Security Bill Could Increase Power of President and DHS

Introduced by ranking Senate members of the Homeland Security and Governmental Affairs Committee, the Protecting Cyberspace as a National Asset Act of 2010, S.3480 is intended to create an Office of Cyber Policy in the executive branch of the government, confirmed by the Senate and ultimately reporting to the president. Senators Joe Lieberman, Blanche Lincoln and Tom Carper introduced the bill publicly on June 10, and a critical part of the bill is that critical infrastructure networks such as electricity grids, financial systems and telecommunications networks need to cooperate with the Office of Cyber Policy. more

One Billion Smartphones in Use in the World, According to a Recent Study

Reported today on mobiThinking blog, the number of smartphones in use worldwide has now broken the 1 billion mark, according to Strategy Analytics. "That is a stunning landmark... It is an awful lot of smartphones. It is equivalent to one seventh of the global population and one sixth of mobile phone subscribers. But it is a lot less smartphones than some people have been reporting. Barely a day goes by without some ludicrous estimate of smartphone penetration." more

ICANN Website Breached, Passwords Obtained by an Unauthorized Person

Usernames/email addresses and encrypted passwords for profile accounts created on the ICANN.org public website have been obtained by an unauthorized person, the Internet Corporation for Assigned Names and Numbers announced Wednesday night. more

Non-Commercial Stakeholder Group Releases Statement on ICANN Staff’s Accountability Plan

Non-Commercial Stakeholder Group (NCSG) today released the following statement on ICANN staff's accountability plan... "A number of public comments and discussions in London focused on the inherent conflict of interest behind staff developing its own accountability and transparency mechanisms, so it was surprising to see that input had not been taken into account in the development of this proposal..." more

APT: The Cancer Within

Unless you have a team employing the latest proactive threat-hunting techniques, the stealthy Advanced Persistent Threat (APT) hiding in your network can pass by completely unnoticed. There are as many definitions of APT as experts writing about the topic, so let's boil it down to the simple essentials: APTs are usually implanted and maintained by a team of malicious actors with the intention of living long term in your network while extracting valuable private information. more

Executive Order and the New Date Privacy Rights of Non-US Citizens

"Last week, President Trump signed an executive order affecting the privacy rights of non-US citizens with respect to data residing in the US," Bruce Schneier writes in his security blog. more