VIDEO OF THE MONTH

In this month's VoM, we highlight Dave Clark's recent presentation, concerning the role of the IETF in Internet protocols and human rights, made to the plenary at IETF 98 in Chicago. Clark reflects on the recent efforts proposing guidelines for human rights considerations in IETF standards work. He recalls earlier...

A multistakeholder governance structure for IoT?

The NTIA’s multistakeholder process on Internet of Things (IoT) and cybersecurity is apparently beginning to bear fruit. At this week’s virtual meeting, a draft document, "Communicating IoT Device Security Update Capability to Improve Transparency for Consumers", was determined to be “consensus” output. In this post, we briefly review the process...

VIDEO OF THE MONTH

Will the Internet fragment? Professor Mueller gave a talk about his book "Will the Internet Fragment?" at Clemson University (his talk starts around 4:30). He says the network effects of global compatibility are powerful enough to defeat a technical fracturing of the web. The real threat comes from governments' attempts to align...

Legalizing Hackbacks?

The idea of cyber self defense - or as some call it, “hack back” - is back into cybersecurity discussions with a proposed Active Cyber Defense Certainty Act by Congressman Tom Graves. Graves, a Republican from Georgia's 14th District, joined with Arizona Democrat Kyrsten Sinema at a panel discussion arranged by...

VIDEO OF THE MONTH

In this video,  Schneier frames the IoT as: “a global decentralized robot called the Internet.” In our view, this robot is run mainly by Internet governance.  Internet security and governance issues will be the same in the Internet of things, but the governance and security issues will have much higher, physical...

Re-Thinking ICANN’s At Large community

Guest post by Ayden Férdeline (@ferdeline) It’s a simple message: the At-Large Advisory Committee isn’t fit for purpose. That’s the conclusion that external consultants ITEMS International have drawn in their draft report, now out for public comment, on the review of the ICANN At-Large community. The 90-page report draws on...

Of Fancy Bears and Men: Attribution in Cybersecurity

Guest Blog Post by Carter Yagemann, Cybersecurity Researcher and Graduate Student at  The Institute for Information Security & Privacy (IISP), Georgia Tech. A few weeks ago I had the privilege of attending the RSA conference as an RSAC Security Scholar. It was my first time attending the conference, and the...