Networks

Blogs

Probability of ROI and Tighter Network Security by Blocking Malicious Subdomains

Failing to block a stealthy malicious host from making connections to your network could cost your company millions of dollars, a damaged reputation, and severe losses in sensitive private data. Threat intel teams have faced on-going problems: Expensive feeds that are slow to catch new threats; Chasing false positives in alerts wastes time and money; and Vendors selling a new appliance for every ill. Would 100% of your users Spot the Bot? more»

The Internet is Dead - Long Live the Internet

Back in the early 2000s, several notable Internet researchers were predicting the death of the Internet. Based on the narrative, the Internet infrastructure had not been designed for the scale that was being projected at the time, supposedly leading to fatal security and scalability issues. Yet somehow the Internet industry has always found a way to dodge the bullet at the very last minute. more»

The Sustained Potential and Impact of Mobile & Wireless Technologies Access for Emerging Economies

I believe Mobile Information and Communications Technologies (ICTs) are and very well remain powerful and best-suited technologies that will help provide connectivity and digital access in a much faster and cheaper way for developing countries of the globe. Thus, they are to be leveraged within their most strategic and profitable functional or usage contexts. Mobile access technologies along with relevant innovations have formed a powerful springboard for the Internet to be significantly accelerated in terms of access, usage and penetration. more»

Wireless Innovations for a Networked Society

Last week, I had the honor of moderating an engaging panel discussion at Mozilla on the need for community networks and the important role they can play in bridging the digital divide. The panel highlighted the success stories of some of the existing California-based initiatives that are actively working toward building solutions to get under-served communities online. more»

Bespoke Processors and the Future of Networks

As I spend a lot of time on Oak Island (not the one on television, the other one), I tend to notice some of those trivial things in life. For instance, when the tide is pretty close to all the way in, it probably is not going to come in much longer; rather, it is likely to start going back out soon. If you spend any time around clocks with pendulums, you might have noticed the same thing; the maximum point at which the pendulum swings is the point where it also begins swinging back. more»

Nation Scale Internet Filtering — Do's and Don'ts

If a national government wants to prevent certain kinds of Internet communication inside its borders, the costs can be extreme and success will never be more than partial. VPN and tunnel technologies will keep improving as long as there is demand, and filtering or blocking out every such technology will be a never-ending game of one-upmanship. Everyone knows and will always know that determined Internet users will find a way to get to what they want, but sometimes the symbolic message is more important than the operational results. more»

APT: The Cancer Within

Unless you have a team employing the latest proactive threat-hunting techniques, the stealthy Advanced Persistent Threat (APT) hiding in your network can pass by completely unnoticed. There are as many definitions of APT as experts writing about the topic, so let's boil it down to the simple essentials: APTs are usually implanted and maintained by a team of malicious actors with the intention of living long term in your network while extracting valuable private information. more»

Is the Passion Over Net Neutrality Misguided? A New Paper Offers a Fresh Technical Approach

"Net neutrality" is implicitly framed as a debate over how to deliver an equitable ration of quality to each broadband user and application. This is the wrong debate to have, since it is both technically impossible and economically unfair. We should instead be discussing how to create a transparent market for quality that is both achievable and fair. In this paper I propose an alternative approach that (potentially) meets the needs of both consumer advocates and free market proponents. more»

Questions About Cuba's 3G Mobile Expansion

ETECSA, Cuba's telecom provider and sole operator of fixed telephony, mobile, and data in the country, is rolling out 3G mobile service in Havana and elsewhere in the country. Telegeography reports there are now 229 3G base stations in Cuba... ETECSA says 3G coverage is available in all of Havana, provincial capitals and tourist resorts. AT&T says there is GSM/GPRS coverage for 85% of national territory. more»

Landmark IPv6 Report Published: State of Deployment 2017

On the fifth anniversary of World IPv6 Launch, we're excited to share a detailed report on the State of IPv6 Deployment in 2017. It really is staggering how far IPv6 deployment has progressed in five years. In mid-2012, Google measured less than 1% of users accessing their services over IPv6. Today that figure is getting close to 20%. Since World IPv6 Launch, several major operators are now delivering the majority of traffic from major content sources like Google, Akamai and others over IPv6. more»

Good Samaritans with Network Visibility

In a big open office 30 feet from me, a team of US Veterans speak intently on the phone to businesses large and small, issuing urgent warnings of specific cyber security threats. They call to get stubborn, confused people to take down hidden ransomware distribution sites. They call with bad news that a specific computer at the business has malware that steals login credentials. more»

Be Agile or Be Edged Out: "Live" from TM Forum 2017

I like a conference that's "Live". Not just a lively crowd coalescing together to passionately discuss and debate matters of common interests, but more so in the sense of physical presence: things you can feel and touch. In the case of the TM Forum Live! 2017 event, held last week at Nice, France, it's the Catalyst Pavilions where innovative solutions, best practices, and even exploratory experimentations were on full display. Do I mean that for an IT Operation Support Systems (OSS) and Business Support Systems (BSS) trade show, you can touch it? Yep. more»

Why Not Connect Cuba's Gaspar Social Streetnet to the Internet?

I've been covering Cuban streetnets (local area networks with independent users that are not connected to the Internet) for some time. Reader Doug Madory told me about Gaspar Social, a new streetnet in Gaspar, a small town in central Cuba. Gaspar Social opened to the public last October and has grown quickly -- about 500 of Gaspar's 7,500 residents are now users. Streetnets are illegal in Cuba and the government has ignored some and cracked down on others... more»

8 Reasons Why Cybersecurity Strategy and Business Operations are Inseparable

In modern society, there is one fact that is unquestionable: The hyper-connectivity of the digital economy is inescapable. A financial institution without an online presence or omni-channel strategy will cease to be competitive. Universities (for-profit or non-profit) must develop and continuously evolve their online learning capabilities if they are to stay relevant. Online retailers are quickly outpacing and rendering their 'brick-and-mortar' counterparts irrelevant. more»

In Response to Offensive Destruction of Attack Assets

It is certainly true that DDoS and hacking are on the rise; there have been a number of critical hacks in the last few years, including apparent attempts to alter the outcome of elections. The reaction has been a rising tide of fear, and an ever increasing desire to "do something." The something that seems to be emerging is, however, not necessarily the best possible "something." Specifically, governments are now talking about attempting to "wipe out" the equipment used in attacks. more»

News Briefs

Over 190 Internet Engineers, Pioneers, Technologists File Comments with FCC on Net Neutrality

Complete Internet Shutdown Reported in Syria

Mozilla, National Science Foundation Offer $2M Prize for a Decentralized Web

Cisco Introduces Intent-Based Network That Can Learn, Adapt and Mitigate Threats

5G Frequency Fees Are Waived in Singapore to Help Drive Market Tests

Trump Signs Cybersecurity Executive Order, Experts Weigh in on the New Draft

French Presidential Candidate Confirms Massive Hack, Emails Dumped Online Two Days Before Election

Seattle Restores ISP Privacy Rules. Could be First of Many Cities to Defeat FCC's Privacy Roll Back

Germany Investigating Legal Grounds to Destroy Servers Used to Carry Out Cyberattacks

Internet Heavy Weights Staying Out of Net Neutrality Battle

Fierce Political Battle Expected as FCC Chair Elaborated on Plan to Reverse 'Net Neutrality' Rules

Cuba Getting Faster YouTube Access in Next 24 Hours, Thanks to Deal Signed in December

Substantial Majority of Americans Say Local Governments Should Be Able to Build Their Own Broadband

Researches Demonstrate How IPv6 Attacks Can Bypass Network Intrusion Detection Systems

Interpol's Michael Moran Receives 2017 M3AAWG Litynski Award

China's First IPv6-Only Backbone Network Connecting 1,200 More Campuses

Data Breaches Reported During 2016 Exposed Over 4.2 Billion Records

Canadian Energy Firms at Bigger Risk of Cyberattack

Over 50 Internet Shutdowns Reported in 2016

Gambia Criticized for Shutting Down Communication Networks on Election Day

Most Viewed

Most Commented

Industry Updates

Participants – Random Selection