Internet of Things

Blogs

Cyber-Terrorism Rising, Existing Cyber-Security Strategies Failing, What Are Decision Makers to Do?

While conventional cyber attacks are evolving at breakneck speed, the world is witnessing the rise of a new generation of political, ideological, religious, terror and destruction motivated "Poli-Cyber™" threats. These are attacks perpetrated or inspired by extremists' groups such as ISIS/Daesh, rogue states, national intelligence services and their proxies. They are breaching organizations and governments daily, and no one is immune. more»

Internet Governance Outlook 2017: Nationalistic Hierarchies vs. Multistakeholder Networks?

Two events, which made headlines in the digital world in 2016, will probably frame the Internet Governance Agenda for 2017. October 1, 2016, the US government confirmed the IANA Stewardship transition to the global multistakeholder community. November 2, 2016, the Chinese government announced the adoption of a new cybersecurity law which will enter into force on July 1, 2017. more»

Bridging California's Rural Digital Divide

A shift has occurred in agriculture: farmers are not only relying on clouds but increasingly, on the cloud. With the click of a mouse, farmers can find out which fields need water and chemical inputs in real time. The use of this technology, called precision agriculture, is helping farming become more productive, environmentally friendly and is revolutionizing how our food is cultivated. more»

Edge Computing, Fog Computing, IoT, and Securing Them All

The oft used term "the Internet of Things" (IoT) has expanded to encapsulate practically any device (or "thing") with some modicum of compute power that in turn can connect to another device that may or may not be connected to the Internet. ... The information security community -- in fact, the InfoSec industry at large -- has struggled and mostly failed to secure the "IoT". This does not bode well for the next evolutionary advancement of networked compute technology. more»

A Three Minute Guide to Network Automation Bliss

The cloud computing paradigm has been making steady progress in 2016. With the DevOps model making its way from cloud to networking, the business upside of fully automated service architectures is finally beginning to materialize. The associated service agility is expected to unleash new business models that transform the ways in which applications and connectivity can be consumed. more»

The Effects of the Forthcoming FCC Privacy Rules on Internet Security

Last week, the Federal Communications Commission (FCC) announced new privacy rules that govern how Internet service providers can share information about consumers with third parties. One focus of this rulemaking has been on the use and sharing of so-called "Consumer Proprietary Network Information (CPNI)" - information about subscribers - for advertising. The Center for Information Technology Policy and the Center for Democracy and Technology jointly hosted a panel exploring this topic last May... more»

Taking a Closer Look at the Recent DDoS Attacks and What it Means for the DNS

The recent attacks on the DNS infrastructure operated by Dyn in October 2016 have generated a lot of comment in recent days. Indeed, it's not often that the DNS itself has been prominent in the mainstream of news commentary, and in some ways, this DNS DDOS prominence is for all the wrong reasons! I'd like to speculate a bit on what this attack means for the DNS and what we could do to mitigate the recurrence of such attacks. more»

Trust Isn't Easy: Drawing an Agenda from Friday's DDoS Attack and the Internet of Things

Last week, millions of infected devices directed Internet traffic to DNS service provider Dyn, resulting in a Distributed Denial of Service (DDoS) attack that took down major websites including Twitter, Amazon, Netflix, and more. In a recent blog post, security expert Bruce Schneier argued that "someone has been probing the defences of the companies that run critical pieces of the Internet". This attack seems to be part of that trend. This disruption begs the question: Can we trust the Internet? more»

The Massive Cyberattack or Chronicle of a Strike Foretold

During the last Computer Law Conference organized by ADIAR (Argentina Computer Law Association) and the Universidad Nacional de Sur, I gave a conference on the Internet of Things, cybercrime and dangerous situation presented by the lack of proper regulation -- a topic in which I have one of my research projects. At the moment some people argued that I was talking about something that might happen in a relatively distant future, dissenting with my view that the possibility was imminent.. more»

The Internet Needs a Security and Performance Upgrade

Many of you will have seen news stories that explained what was going on: a huge DDoS attack on the infrastructure of Dyn had taken down access to many large websites like Twitter. A great deal of digital ink has since been spilled in the mainstream press on the insecurity of the Internet of Things, as a botnet of webcams was being used. Here are some additional issues that might get missed in the resulting discussion. more»

Africa, Let's Embrace v6 Now!

AFRINIC is the regional Internet registry for Africa, and our core activity is to manage and distribute Internet numbers resources (IPv4, IPv6 and ASN's) to the 57 economies in Africa. IPv4 address scarcity is a very real issue worldwide, the internet keeps growing and the demand for Internet addresses will continue to grow. Africa has the lowest number of Internet users in the world. Internet's penetration in Africa jumped from very low level in 2009, to around 16% of individuals in 2013 and over 20% in 2015. more»

Fast-Moving Technologies Need Bottom-Up Standards

Technical standards typically are not something we think about: they simply make things work. Credit for this goes to the innovators who ensure that the technical standards needed to make many of our devices work together are robust and effective. Given how central telecommunications and information and communications technologies (ICTs) are to our economies and to how we live, it is crucial that they function as expected. Standards enable interoperability, as well as functionality, reliability, and safety. more»

The Internet's Climate Quandary and the Inconvenience of Practicing What We Preach

It all started earlier this year in June. I was coding transcripts of the past global Internet Governance Forum (IGF) meetings as part of a data mining exercise for DiploFoundation's Geneva Internet Platform (GIP). Pouring over transcript after transcript, the work was tedious, but I was learning a great deal about the Internet governance community as well. My interest was piqued by the conversations, the familiar names I came across, and the multi-stakeholder manifestation of politics, perspectives, and positions. more»

Transformation - the Real Business Case for NFV and SDN

2016 has seen a steady flow of announcements on successful Network Functions Virtualization (NFV) Proof-of-Concept deployments, mostly focused on virtualizing Customer Premise Equipment (vCPE). This has been a relatively straight forward starting point because unlike many other NFV applications, the vCPE use case does not involve complex activities like having to scale in or out individual services. more»

Infrastructure for a Connected World

Connected devices need a free-to-use infrastructure that allows for innovation beyond the needs of a provider or other intermediary. An interface is best when it disappears and the user can focus the problem at hand. In the same way infrastructure, is best when it can simply be assumed and becomes invisible. With an invisible infrastructure as with an invisible interface a user can concentrate on their tasks and not think about the computer. Dan Bricklin and I chose to implement VisiCalc on personal computers that people could just purchase. more»

News Briefs

U.S. Department of Commerce Issues IoT Advancement Guidelines

FTC Announces Internet of Things Challenge, Offers $25,000 for Best Technical Solution

Internet Society Urges for Increased Effort to Address Unprecedented Challenges Facing the Internet

BITAG Outlines Steps to Dramatically Improve the Security and Privacy of IoT Devices

Russian Security Firm Kaspersky Announces Its Own Secure OS, 14 Years in the Making

Major Russian Banks Under a Multi-Day Cyberattack

U.S. House Committee to Hold Hearing on Recent Cyberattacks

Researchers Demonstrate How Smart Bulbs Can Be Hacked to Cause Mass Disruptions

U.S. Senator Inquiring Into Friday's Crippling Cyberattack

U.S. Department of Transportation Issues Federal Cybersecurity Guidance to Automotive Industry

U.S. Justice Department Forms Group to Study National Security Threats of IoT

Data Growth, IoT Will Lead to Unlimited Energy Consumption If Not Controlled, Scientists Warn

IoT to Reach 27 Billion Devices, Will Generate $3 Trillion by 2025, Says Machina

Internet Governance Forum USA 2016 on Thursday, July 14

The Netherlands First Country to Implement Long Range (LoRa) Network for IoT

Approach IoT With Security in Mind, Says AT&T Chairman

Cisco's Big Bet on IoT, Acquires Jasper for $1.4 Billion

Mozilla Announces End of Firefox OS, Will Put Focus on IoT

IoT a Major Global Development Opportunity, ITU Reports

Internet of Things Market Expected to Reach $3.04 Trillion, 30B Connected Things in 2020

Most Viewed

Most Commented