/ Most Viewed

Am I Safer Within an Organization or by Myself?

An Internet Bill of Rights may or may not be a good idea. The point here is that, besides highly commendable topics such as net neutrality and privacy, some of them seem to mandate cybersecurity. Approved in Brazil last May, the Marco Civil includes the principle of preservation of stability, security and functionality of the network, via technical measures consistent with international standards.  more

Security Researchers Find Serious Vulnerability in SSL

Sophie Curtis of eWeek reports: "Researchers have discovered a hole in the secure sockets layer (SSL) protocol, enabling man-in-the-middle attackers to hack into secure applications despite traffic encryption. According to security researcher Chris Paget, hackers can exploit this flaw by breaking into shared hosting environments, mail servers and databases, and inserting text into encrypted traffic as it passes between two end users. This could lead to fragmentation of SSL transactions, giving hackers the opportunity to inject false commands such as password resets into communications which are otherwise encrypted." more

The 3 Keys to Unlock Your Operational Performance

Like any business, service providers must constantly evaluate the success of their operations. For implementations and installments, this is usually done by setting a strategic objective and then measuring progress made towards completion. But for operational teams, success is often measured by the repeated achievement of daily goals aligned to corporate objectives. Setting these benchmarks and collecting this data is accomplished by frequently running key performance indicators (KPIs). more

Internet Service Restored in Egypt

Renesys reports that Internet services in Egypt have been restored. According to the report, Egyptian Internet providers returned to the Internet at 09:29:31 UTC (11:29am Cairo time). "Websites such as the Egyptian Stock Exchange, Commercial International Bank of Egypt, MCDR, and the US Embassy in Cairo, are once again reachable. All major Egyptian ISPs appear to have readvertised routes to their domestic customer networks in the global routing table."
 more

Zero-Touch Provisioning… Really?

Zero-touch provisioning (ZTP) -- whatever does that mean? Of course, it is another marketing term. I think the term "closer to zero touch provisioning" is probably better, but CTZTP -- as opposed to ZTP -- is a bit more of a mouthful. Whenever I hear language like this that I'm not familiar with, I get struck by a bolt of curiosity. What is this new and shiny phrase that has just appeared as if from nowhere? more

Professional Services Are a Safe Bet to Address Staff Shortages

Many organizations today are tightening their belts. They have smaller budgets and fewer resources even though they face an ever-growing list of projects, tasks and corporate IT initiatives to complete. IT departments are hard pressed to streamline operations but don't necessarily have the manpower -- be it resources or specific skillsets -- to add capabilities that will achieve such efficiency. There are only a few possible solutions organizations can consider to address this common problem... more

Internet Society: ITU-T Failure to Adhere to Its Own Agreements With Respect to MPLS

Today, the ITU-T Study Group 15 determined a Recommendation that defines Y.1731 based operations, administration and management (OAM) for MPLS transport networks. This decision sets the stage for a divergence in MPLS development; it creates a situation where some vendors will use the IETF standard for MPLS OAM while other vendors implement the ITU-T Recommendation for OAM. This situation ensures that the two product groups will not work together. more

Why Mid-Sized Businesses That Embrace the Cloud See Improved Revenues

According to a recent study from IBM, mid-sized businesses that embrace cloud technology see nearly double the revenue and increased profit growth compared to their more hesitant peers. The study, which included 800 leading global IT professionals, found that the 20% of organizations that had committed more resources to the cloud were reaping significant cost-cutting advantages and improved levels of efficiency. more

Google Exec: ISPs Must Get Tough on Malware Infested Computers on Their Networks

Ryan Naraine reporting at Threatpost: "Head of Google's anti-malvertising team Eric Davis wants Internet Service Providers (ISPs) to look beyond profits and take a more proactive approach to dealing with malware-infested computers on their networks. During a keynote presentation at the Virus Bulletin conference here, Davis said competitors in the ISP space must look beyond profits and partner on new initiatives to deal with the "parasites" that have taken control of the Internet landscape." more

Measuring Digital Rights for the Attainment of Internet Universality

Measuring the information society in order to achieve development goals is a challenge and a necessity to ascertain progress made in terms of ICT sector development and socio-economic growth. Many intergovernmental, governments, non-profit and private organisations have sought to tackle the challenge through setting targets, defining indicators, and applying research methods to measure progress. Nevertheless, ambitious goals and targets relate mostly to the achievement of physical connectivity to ICT... more

TAS Outage Shows Tech Errors Can Happen in Any Organization

Last week, the Internet Corporation for Assigned Names and Numbers (ICANN) was forced to extend the deadline for the new gTLD application to April 20th, after the application system crashed and the technical issue which enabled some applicants to see file names and user names that belonged to other applicants. ... ICANN's decision to extend the deadline is reasonable in the circumstances. more

Internet Heavy Weights Staying Out of Net Neutrality Battle

Tech giants including Aamzon and Tiwtter are staring out of the contentious, public fight over the future of the Obama-era net neutrality rules. more

FBI’s Chabinsky Defines and Describes Cybercriminal Operations at FOSE

Neil Schwartzman writes: Steven R. Chabinsky, Deputy Assistant Director, Cyber Division of the Federal Bureau of Investigation gave a keynote at the GovSec/FOSE Conference in Washington, D.C., March 23, 2010. Full text of the speech heremore

U.S. Department of Commerce Seeking Public Comments for Deployment of DNSSEC

During a conference, "Internet of Things," in France, the U.S. Department of Commerce made the announcement that it will hold a public consultation on the different proposals to cryptographically sign the DNS root zone file, and determine who will hold the root zone trust anchor for global DNSSEC implementation, says Milton Mueller on the Internet Governance Forum blog. The blog, titled "Commerce Department asks the world to comment on its plans to retain control of the root," continues... more

The Wild West Of Performance Measurement: Using Data To Ensure Optimal Vendor Selection

Data-driven decision making relies on contextual understanding of how data is gathered and the type of analysis used to arrive at an outcome. The popularity of data-driven decision-making has increased the number of companies using statistics to support a preference or vendor selection. The Internet Performance Management (IPM) market hasn't been spared, but, unlike other markets where institutions have codified a standard for qualification and quantification, such as the FDA's nutrition labels, Insurance Institute for Highway Safety, or the Coffee Quality Institute, the IPM market is still in the Wild West stage. more