Why aren’t we fixing route leaks?

In case you missed it (you probably didn't), the Internet was hit with the Monday blues this week. As operator-focused lists and blogs identified, At 17:47:05 UTC yesterday (6 November 2017), Level 3 (AS3356) began globally announcing thousands of BGP routes that had been learned from customers and peers and...

IGP wins prize for IoT proposal

From left to right: Ishan Mehta, Karl Grindal and Karim Farhat We all know that allaying security and privacy concerns is decisive if the IoT is ever to deliver on all its hype. Georgia Tech’s Institute for Information Security & Privacy (IISP) is the collaborative focal point behind 11 separate...

VIDEO OF THE MONTH

The cyber norm panel that took place in early February at the Carnegie Endowment for International Peace sheds light on how “cyber norms” came about. States’ negotiations over international cybersecurity strategy evolved from focusing on 'control of weaponization of information technology' to 'managing states’ behavior through cyber norms'. Moreover, it...

A Global Cyber-Attribution Organization – Thinking it through

Initiatives to globalize cybersecurity governance took a step forward this weekend with the release of a RAND Corporation study of an international attribution organization. The Microsoft Corporation’s idea for a global attribution agency modeled on the International Atomic Energy Agency was the catalyst for this report; the research was funded...

Legalizing Hackbacks?

The idea of cyber self defense - or as some call it, “hack back” - is back into cybersecurity discussions with a proposed Active Cyber Defense Certainty Act by Congressman Tom Graves. Graves, a Republican from Georgia's 14th District, joined with Arizona Democrat Kyrsten Sinema at a panel discussion arranged by...