/ Most Viewed

Tactics for Responding to Cyber Attacks - Squeezing Your Cyber Response-Curve: Part 2

In part one of this post we introduced the cyber response curve. In this post, we have outlined some observations which illustrate how different level of maturity and approaches can affect your cyber response curve. more

RIPE NCC Announces Launch of IPv6 Act Now! Website

The RIPE NCC today announced the launch of the IPv6 Act Now! website. RIPE NCC, a Regional Internet Registry (RIR) for Europe, the Middle East and parts of Central Asia, calls the website a one-stop destination on IPv6 where everyone can understand and provide a variety of useful information aimed at promoting the global adoption of IPv6. "The site is for anyone with an interest in IPv6, including network engineers, company directors, law enforcement agencies, government representatives and civil society." more

Study Ranks Riskiest Online Cities in US

A recent study by Symantec Norton and Sperling's Best Places has ranked 50 cities in the United States by "Riskiest Online Cities". The study included investigation of a number of factors including... more

What Trump and Clinton Said About Cybersecurity in the First US Presidential Debate

The Internet and tech got very little mention last night during the first of three presidential debatest. The only notable exception was cybersecurity where moderator Lester Holt asked: "Our institutions are under cyber attack, and our secrets are being stolen. So my question is, who's behind it? And how do we fight it?" The following are the responses provided to the question by the two candidates. more

The Case Against Regulating AI in One Chart

A three-decade natural experiment suggests America's centralized regulatory review fostered far greater wealth creation than Europe's precautionary principle, raising stark questions about whether importing EU-style AI rules would undermine US innovation and prosperity. more

U.S. Officials Asking Cuba to Speed Up Its Internet Infrastructure Build Out

A number of Senior U.S. officials and business leaders visited Cuba last week and urged the government to speed up its build out of Internet infrastructure and to make it more widely available, Mario Trujillo reports in The Hill. more

Controversial Chinese Cybersecurity Law Gets 3rd Reading

The controversial Chinese cybersecurity law that has been sparking objections amongst foreign governments and business groups reached a step closer to approval today as parliament held the third reading of the draft bill. more

Consumer Reports: U.S. Consumers Lost Nearly $8.5 Billion to Viruses, Spyware, and Phishing

U.S. consumers lost almost $8.5 billion over the last two years to viruses, spyware, and phishing schemes according to latest projections from the Consumer Reports State of the Net survey. Additionally, report estimates that American consumers have replaced about 2.1 million computers over the past two years because of online threats. Survey has also reveals some hopeful signs such as declining chances of becoming a cybervictim -- consumers have 1 in 6 chance of becoming a cybervictim, down from 1 in 4 in 2007. more

Syria’s Undersea Cable Repairs Will Take Down 60% of Nation’s Internet for Close to 10 days

Syrian Telecom has announced that 60 percent of the country's Internet will be down for close to ten days, starting Wednesday. more

Starlink’s Role in Last Year’s Los Angeles Fires

During California's devastating 2025 wildfires, Starlink, Tesla, and T-Mobile offered vital emergency connectivity. Their improvised response reveals both the promise of satellite-based disaster aid and the need for formalised coordination with public agencies. more

Iran-Linked Cyberattacks Expose Fragility of America’s Industrial Nerve System

Iran-linked hackers infiltrated US industrial control systems, disrupting energy and water infrastructure. The attacks highlight systemic vulnerabilities in internet-connected devices and signal an enduring cyber threat despite easing geopolitical tensions. more

The Role of Cloud Resource Provisioning in Web App CICD Pipelines

Thanks to wide adoption of the Infrastructure as Code (IaC) approach, programmatic provisioning of cloud resources is slowly transforming almost every aspect of computing, with administration of web apps having emerged as a key use case. With IaC, it's possible to streamline resource management tasks, shorten time-to-market, control costs, and scale at will. The adoption of continuous integration and continuous delivery (CICD) pipelines is already making a huge difference in web app deployment and cloud resource management. more

Pro-Trump Russians Accused for Democratic National Committee Email Hack, FBI Investigating

"DNC Hack Prompts Allegations of Russian Involvement," Damian Paletta and Devlin Barrett reported in the Wall Street Journal today: "U.S. authorities said they are still investigating who perpetrated the hack, but cybersecurity experts said the email release resembled past examples of political interference that other countries have tied to Russia." more

Information Warfare Publicly Admitted, No Longer Just a Tool for Espionage

Gadi Evron reporting today on Dark Reading: "A National Journal Magazine article called "The Cyberwar Plan" has been making waves the last few days in our circles -- it's about how cell phone and computer attacks were used against Iraqi insurgents by the National Security Agency (NSA). Its significance is far more than just what's on the surface, however. The article describes several issues and that in my opinion confuses what matters..." more

Happy OneWebDay: Celebrations are Underway Around the World

Today marks the third annual OneWebDay (Earth Day for the Internet) and communities around the world are holding events to learn about and advocate the Internet. Gatherings are being held in major U.S. cities as well as Melbourne, London, Paris, Berlin, Brussels, Copenhagen, Singapore, Tunisia and elsewhere. more