Unlike most children of his age, Alex Bahati, 16, is privileged to have a smart phone at his disposal when he is at home during school holidays. Alex lives with his two young siblings and a house help. His parents work with an international NGO and their work demands a lot of travel and this keeps them away from the family most of the time. The flat where Alex lives is fixed with free Wifi giving the residents access to the Internet without much restriction. At Domus Marie Secondary School where he is in Form one, the deputy principle Mr. Thomson reported that Alex is one among a couple of students who are withdrawn and sleepy in class most of the times. His parents have also pleaded with the school administration to give Alex some special attention because he is addicted to the Internet.
As founder of MediaNetWorks, an advocacy and capacity building organization, I have been holding presentations and seminars about Internet safety in local schools, churches, and events organized for children. Some events of seven years ago remain vividly clear. While giving a workshop on Internet Safety to teens at a local Church in Ngong (Nairobi), Continue reading
Dell EMC's next phase in open networking will bring about a solid foundational platform capable of running mission-critical applications, allowing for flexibility and expansion to support emerging modes of operation.
This eBook looks at the growing interest in SD-WAN as well as some of the challenges end-users may encounter when migrating to an SD-WAN environment. Download today.
While Internet-connected devices afford utility unseen in generations past, they may also create a host of security issues, ranging from insignificant to catastrophic in potential impact. In an effort to mitigate this risk, the Internet Society partnered with Innovation, Science and Economic Development, the Canadian Internet Registration Authority, CANARIE, and CIPPIC to host a multistakeholder meeting on the security of IoT devices. The event takes place in Ottawa, Canada on April 4, 2018.
This meeting will be the first in a year-long process to develop recommendations for a set of norms and/or policies to secure IoT in Canada. This event will serve as an opportunity to begin planning and implementing a bottom-up, organic process to remedy existing and potential security challenges in Canada’s national IoT ecosystem.
This session will focus on IoT as it relates to two specific themes: consumer protection and network resiliency. The event will begin with presentations from engaged stakeholders in order to lay the groundwork for group discussion. Participants will then work in small groups to develop consensus on key IoT issues and determine what can be done to meaningfully impact consumer protection and network resiliency. This will create the basis of discussion Continue reading
The software uses a technology Pivot3 calls Intelligent Cloud Engine that extends policy-based management and automation to the cloud.
This is a guest post by Blake Loring, a PhD student at Royal Holloway, University of London. Blake worked at Cloudflare as an intern in the summer of 2017.
Compression is often considered an essential tool when reducing the bandwidth usage of internet services. The impact that the use of such compression schemes can have on security, however, has often been overlooked. The recently detailed CRIME, BREACH, TIME and HEIST attacks on TLS have shown that if an attacker can make requests on behalf of a user then secret information can be extracted from encrypted messages using only the length of the response. Deciding whether an element of a web-page should be secret often depends on the content of the page, however there are some common elements of web-pages which should always remain secret such as Cross-Site Request Forgery (CSRF) tokens. Such tokens are used to ensure that malicious webpages cannot forge requests from a user by enforcing that any request must contain a secret token included in a previous response.
I worked at Cloudflare last summer to investigate possible solutions to this problem. The result is a project called cf-nocompress. The Continue reading