/ Most Viewed

A Look at the Security Collapse in the HTTPS Market

While in recent years, HTTPS has become integral part of protecting social, political, and economic activities online, widely reported security incidents -- such as DigiNotar's breach, Apple's #gotofail, and OpenSSL's Heartbleed -- have exposed systemic security vulnerabilities of HTTPS to a global audience. more

Cybersecurity Standards Competition

The conventional wisdom in the world of legacy standards-making is that monolithic standards produce, if not accelerate, better products and services. Conformance, certification, and associated labelling schemes to implement those standards were believed essential to trust. Although competition law seems now evolving in the other direction, regulatory standards-making bodies themselves have been accorded considerable anticompetitive cartel liability protection. more

Telecoms Development Booming in the French Pacific Territories

After the nuclear submarine debacle with France, political ties have been restored, and both France and Australia have agreed on further cooperation in the South Pacific, where France has several overseas territories. Also, here telecoms is a key issue. Such cooperation has become more urgent with the increased political interest of China in the region. more

NTIA Chief Suggests “Cooling Off Periods” for ICANN Staff Before Moving On to Outside Jobs

In a statement delivered during the ICANN63 in Barcelona, David Redl,
Assistant Secretary of Commerce for Communications and Information (NTIA) said that while the community has greatly improved ICANN's accountability there is still room left for improvements. more

For the First Time Wireless Carriers and Auto Makers Seek Common Ground on Wireless Standards

For the first time auto makers and wireless carriers are actually seeking common ground around the creation of the wireless new standard, writes Roger Lanctot, Associate Director in the Global Automotive Practice at Strategy Analytics. more

Congress Still Raising Concerns About ICANN’s New gTLD Program

Juliana Gruenwald reporting in the NationalJournal: "Nearly six months after the program was launched, key members of Congress are still raising concerns about a plan to introduce hundreds of new Internet addresses into the domain name systems, saying they want fresh assurances that the new strings will not harm trademark holders and that the public has adequate opportunity to comment. The latest salvo came on Tuesday from the top leaders of the House and Senate Judiciary committees..." more

ICANN’s Registration Data Request Service: Open Working Session at ICANN79

Last November, ICANN launched a ticketing system for those interested in obtaining domain name registration data ("WHOIS"). Titled Registration Data Request Service, or RDRS, the portal aims to direct requests for WHOIS data to participating registrars, who then decide whether or not to disclose the data. more

Ransomware Attacks Skyrocket: Median Cost Doubles to $26,000, Representing a Quarter of All Breaches, Reports Verizon

A report from Verizon Business's 16th annual Data Breach Investigations Report (DBIR) reveals a startling surge in the frequency and cost of cyberattacks. It analyzed 16,312 security incidents and 5,199 breaches, showing a sharp uptick in the cost of ransomware.  more

A Call to Action for an Inclusive WSIS+20 Review

Last week, GPD, together with 114 organisations and 57 individual experts from civil society, the technical community, industry and academia, presented a set of cross-stakeholder community recommendations aimed at operationalising the modalities for the twenty-year review of the WSIS (WSIS+20). The open letter responds to the adoption on 25 March of a UN General Assembly resolution on WSIS+20 modalities, advocating for a transparent and inclusive review process that meaningfully engages all relevant stakeholders. more

Characterizing the Friction and Incompatibility Between IoC and AI

Many organizations are struggling to overcome key conceptual differences between today's AI-powered threat detection systems and legacy signature detection systems. A key friction area -- in perception and delivery capability -- lies with the inertia of Indicator of Compromise (IoC) sharing; something that is increasingly incompatible with the machine learning approaches incorporated into the new breed of advanced detection products. more

Over $31 Million Stolen by Hackers from Russian Central Bank

Hackers have stolen over 2 billion rubles ($31 million) from correspondent accounts at the Russian central bank, the bank reported today. more

Should You Pay Ransomware Demands?

Ransomware is a huge problem for small and medium businesses, and the most important question is this: should you pay the ransom? Ransomware has proven a successful revenue generator for criminals, which means the risk to businesses will grow as ransomware becomes more sophisticated and increasing numbers of ethically challenged criminals jump on the bandwagon. more

ICANN Cancels Jordan Meeting Due to Middle East Turmoil

Following reports by various sources yesterday, ICANN today has officially announced that it will not hold its Jun 20-24 Public Meeting in Amman, Jordan. ICANN's Board of Directors made the decision in light of recent developments in the Middle East. "The Board reluctantly made its decision after closely monitoring the rapidly changing developments affecting the Middle East. The decision reflects the Board’s view that regional developments could have a negative impact on attendance at the meeting," says ICANN's via a blog post today. more

ISOC Will Not Participate in NETmundial Initiative

The Internet Society Board of Trustees has issued an announcement stating that it cannot agree to participate in or endorse the Coordination Council for the NETmundial Initiative. "We are concerned that the way in which the NETmundial Initiative is being formed does not appear to be consistent with the Internet Society’s longstanding principles," says the statement released today. more

Freedom to Connect

Over the last ten years, Andrew Odlyzko has been writing about a pricing algorithm that would assure reasonable service levels at reasonable prices. If you're going to F2C, you might want to read that brief article or this slightly more complex one to learn (or refresh your sense of) PMP -- Paris Metro Pricing models to deal with network congestion. You'll also get a sense of why throwing bandwidth at the network will not be sufficient. Here's a great article from 1995... more