/ Most Viewed

Reduce Churn with Better Visibility Over Your Service Activation Processes

How much visibility do you have over service activation processes? For many service providers, the answer to that question is bleak. The sad truth is that visibility over service activation processes, including errors and misconfigurations, is lacking in many Tier 3, Tier 2, and even Tier 1 organizations. Today's operators often turn to multiple siloed systems when attempting to ensure that services are activated accurately, on time, and are working as promised. more

Seven Stages of the Internet

The Internet is evolving far beyond screens and smartphones. A proposed seven-stage framework anticipates a future shaped by autonomous agents, sensory wearables, global connectivity, and quantum networks redefining how humans interact with the digital world. more

NETmundial +10: Inspiration for Multistakeholder Digital Governance, but Is It Enough?

Last week (29-30 April), Global Partners Digital (GPD) joined other civil society groups, business actors, the technical community and governments in São Paulo, Brazil for NETmundial+10: the ten year follow up to the landmark NETmundial process in 2014, which set out principles for multistakeholder approaches to Internet governance. In the intervening decade, the policy landscape has been transformed by an increase in policy and normative frameworks related to digital technologies, as well the advent of new technologies—particularly AI—and their attendant opportunities and challenges. more

For the First Time Wireless Carriers and Auto Makers Seek Common Ground on Wireless Standards

For the first time auto makers and wireless carriers are actually seeking common ground around the creation of the wireless new standard, writes Roger Lanctot, Associate Director in the Global Automotive Practice at Strategy Analytics. more

Networking Firm Loses $46.7 Million to Fraudulent Wire Transfer

Ubiquiti Networks Inc., a San Jose based maker of networking technology, has disclosed that cyber criminals stole $46.7 million via a "business email compromise fraud involving employee impersonation." more

Cyber Security Forecast for 2009: Data and Mobility Key Part of Emerging Threats

Georgia Tech Information Security Center (GSTISC) today held its annual Security Summit on Emerging Cyber Security Threats and released the GTISC Emerging Cyber Threats Report for 2009, outlining the top five areas of security concern and risk for consumer and enterprise Internet users for the coming year... According to the report, data will continue to be the primary motive behind future cyber crime-whether targeting traditional fixed computing or mobile applications. "It's all about the data," says security expert George Heron -- whether botnets, malware, blended threats, mobile threats or cyber warfare attacks. more

Decoding the WSIS Message - ISOC Releases Matrix of Countries’ WSIS+10 Positions

Over the next few months, major discussions at the United Nations will shape the future of Internet governance. In order to prepare with our community for the ten-year Review of the World Summit on the Information Society (WSIS+10), in New York, USA, on 15 to 16 December 2015, we are publishing today a matrix of the countries' positions on WSIS+10. The matrix draws from their written contributions to the UN this summer, and is designed to help all stakeholders better understand the key issues at the the heart of the negotiations. more

New Brandsight Domain Management Survey Reveals Companies Face Challenges Managing Domain Portfolios

Brandsight recently concluded their Second Annual Domain Management Survey. Respondents to the survey were corporate domain name professionals. Of those that responded, 35% had portfolios that were between 3,000-10,000 domains and another 30% had portfolios greater than 10,000 domains. Fifty-seven percent of respondents reported that they manage domains out of the legal department, with the remaining respondents' portfolios managed out of IT, marketing and other groups. more

CaribNOG Partners with Global Infrastructure Body PCH to Strengthen Caribbean Resilience

CaribNOG and PCH have renewed their partnership to boost the Caribbean's Internet resilience, expanding technical capacity, advancing inclusive training, and strengthening the people and systems essential for recovery as islands rebuild after Hurricane Melissa. more

Auction to Sell .versicherung Top Level Domain

The Top-Level Domain (TLD) .versicherung (German word for INSURANCE) managed by dotversicherung-registry GmbH in Hamburg, will be holding an international auction executed by Right of the dot, LLC in Lauderdale USA in collaboration with Heritage Auctions. The auction will take place on 26th of August 2015, 10:00 am Eastern Standard Time (UTC -4:00). more

Syria Shuts Down Internet to Prevent Cheating During National High School Exams, Say Insiders

Early this morning in Syria, the Internet was almost entirely down for four hours. It was the ninth such outage since 31 July 2016 -- each one lasting from approximately 4am to 8am local time. more

Hosters: Is Your Platform Being Used to Launch DDoS Attacks?

As anyone who's been in the DDoS attack trenches knows, large multi-gigabit attacks have become more prevalent over the last few years. For many organizations, it's become economically unfeasible to provision enough bandwidth to combat this threat. How are attackers themselves sourcing so much bandwidth? more

Overcoming DNSSEC Challenges: A Guide for TLDs

Despite offering robust protection for the Domain Name System, DNSSEC suffers from poor adoption due to its complexity, cost, and operational risks. Automation and algorithmic improvements now offer practical solutions for broader deployment. more

North Korea’s Spy Agency Behind WannaCry

According to a report from The Washington Post, the NSA has linked the North Korean government to the creation of the WannaCry ransomeware that resulted in affecting over 300,000 people in almost 150 countries last month. more

Should You Pay Ransomware Demands?

Ransomware is a huge problem for small and medium businesses, and the most important question is this: should you pay the ransom? Ransomware has proven a successful revenue generator for criminals, which means the risk to businesses will grow as ransomware becomes more sophisticated and increasing numbers of ethically challenged criminals jump on the bandwagon. more