Announcing the Online Trust Audit & Honor Roll Methodology for 2018

The Online Trust Alliance (OTA) is an Internet Society initiative that aims to enhance online trust, user empowerment, and innovation through convening multistakeholder initiatives and developing and promoting best practices, ethical privacy practices, and data stewardship. One of OTA’s major activities is the Online Trust Audit & Honor Roll, which promotes responsible online privacy and data security practices and recognizes leaders in the public and private sectors who have embraced them. This morning, we released the methodology we’ll use for this year’s audit.

The report will analyze more than 1,000 websites on consumer protection, site security, and responsible privacy practices. Based on a composite weighted analysis, sites that score 80 percent or better overall, without failing in any one category, will be recognized in the Honor Roll.

Building largely on past criteria, this year’s updates include GDPR compliance and other security and privacy standards and practices, as well as adding a healthcare sector. From the press release:

Key changes to this year’s Audit include:

  • Consumer Protection (email authentication, domain security and anti-phishing technologies) – more granular assessment of Domain-based Message Authentication, Reporting and Conformance (DMARC) support, and increased weight for use of opportunistic Transport Layer Security (TLS), which Continue reading

Private LTE, using new spectrum, approaching ‘market readiness’

Deploying private internet of things LTE networks using open-access, about-to-be-released, shared spectrum is getting closer to the starting gate, according to the CBRS Alliance, which has just announced the inception of eight global test labs for its OnGo equipment certifications. Enterprises will be able to use their own, in-building, dedicated equipment for the cellular-like systems on new frequencies.As a sign “of market readiness, OnGo access points from several member companies have already started the testing process,” CBRS Alliance says in the release on its website. OnGo is CBRS Alliance’s moniker for the mobile broadband-like CBRS LTE shared-spectrum equipment.To read this article in full, please click here

AfPIF 2018 Day Two: Connecting Cape Town to Cairo

Africa’s dream of Cape Town to Cairo fiber connectivity has moved closer, with Liquid Telecom announcing that it has made considerable progress is signing agreements with regulatory authorities and partners within the route.

Liquid Telecom has an ambitious plan of reducing latencies in connectivity between Cape Town and Cairo. Currently, traffic is routed through Europe, with latencies of 209ms, and it will be reduced to 97ms.

In his keynote speech at the Africa Peering and Interconnection Forum (AfPIF), Ben Roberts, Liquid CTO, said that the project will be implemented through existing Liquid infrastructure within different countries, partnership with existing infrastructure providers, and regulators. The project is expected to be done by 2020 and to eventually connect East and West Africa.

Liquid is expecting the African Continental Free Trade Area (AfCFTA) agreement, signed and ratified recently, to drive city-to-city interconnectivity, as more countries look for ways to trade with each other and eventually exchange Internet traffic. The goal to increase intra-Africa broadband traffic.

Roberts projects the infrastructure currently being set up will be highly used by the youth, who have grown up online – through education, social media, and gaming applications. The Internet of Things is expected to grow; currently most Continue reading

Analysts: SD-WAN 5-year annual growth rate tops 40%

Whether users are looking to stabilize cloud-connected resources, better manage remote networks or simply upgrade a timeworn wide area environment, software-defined-WAN (SD-WAN) technologies are what’s on the purchasing menu.The proof lies in the fact that this segment of the networking market will hit $4.5 billion and grow at a 40.4% compound annual growth rate from 2017 to 2022. In 2017 alone, SD-WAN infrastructure revenues increased 83.3% in 2017 to reach $833 million, according to IDC's recent SD-WAN Infrastructure Forecast.  [ Click here to find out more about SD-WAN and why you’ll use it one day and learn about WANs and where they’re headed. | Get regularly scheduled insights by signing up for Network World newsletters. ] A related report from researchers at the Dell’Oro Group predicts revenue from SD-WAN software components, including controller and virtual network functions, will grow almost twice as fast as the hardware components.  Over the next five years, SD-WAN software revenue will grow at a 41% compounded annual growth rate, compared to 21% for hardware.To read this article in full, please click here

Analysts: SD-WAN 5-year annual growth rate tops 40%

Whether users are looking to stabilize cloud-connected resources, better manage remote networks or simply upgrade a timeworn wide area environment, software-defined-WAN (SD-WAN) technologies are what’s on the purchasing menu.The proof lies in the fact that this segment of the networking market will hit $4.5 billion and grow at a 40.4% compound annual growth rate from 2017 to 2022. In 2017 alone, SD-WAN infrastructure revenues increased 83.3% in 2017 to reach $833 million, according to IDC's recent SD-WAN Infrastructure Forecast.  [ Click here to find out more about SD-WAN and why you’ll use it one day and learn about WANs and where they’re headed. | Get regularly scheduled insights by signing up for Network World newsletters. ] A related report from researchers at the Dell’Oro Group predicts revenue from SD-WAN software components, including controller and virtual network functions, will grow almost twice as fast as the hardware components.  Over the next five years, SD-WAN software revenue will grow at a 41% compounded annual growth rate, compared to 21% for hardware.To read this article in full, please click here

Analysts: SD-WAN 5-year annual growth rate tops 40%

Whether users are looking to stabilize cloud-connected resources, better manage remote networks or simply upgrade a timeworn wide area environment, software-defined-WAN (SD-WAN) technologies are what’s on the purchasing menu.The proof lies in the fact that this segment of the networking market will hit $4.5 billion and grow at a 40.4% compound annual growth rate from 2017 to 2022. In 2017 alone, SD-WAN infrastructure revenues increased 83.3% in 2017 to reach $833 million, according to IDC's recent SD-WAN Infrastructure Forecast.  [ Click here to find out more about SD-WAN and why you’ll use it one day and learn about WANs and where they’re headed. | Get regularly scheduled insights by signing up for Network World newsletters. ] A related report from researchers at the Dell’Oro Group predicts revenue from SD-WAN software components, including controller and virtual network functions, will grow almost twice as fast as the hardware components.  Over the next five years, SD-WAN software revenue will grow at a 41% compounded annual growth rate, compared to 21% for hardware.To read this article in full, please click here

There’s a Techlash. The G20 Should Listen.

The Internet is at risk. Once thought of as the global equalizer, opening doors for communication, work opportunities, commerce and more – the Internet is now increasingly viewed with skepticism and wariness. We are witnessing a trend where people fare feeling let down by the technology they use. Fueled by unease and uncertainty about the growing scope of threats to security and privacy that come with an always-on, tech-driven world, people are now looking for ways to disconnect and are placing greater emphasis on values and human interaction.

The way we live our lives is now inextricably linked to the Internet – which is estimated to contribute US$6.6 trillion a year, or 7.1 percent of total GDP in the G20 countries by 2020. In developing nations, that digital economy is growing steadily by 15 to 25 percent a year. Yet the Internet essentially is under attack. Large scale data breaches, uncertainties about how our data is being used and monetized, cybercrime, surveillance and other online threats are impacting Internet users’ trust. We are at an important crossroads for the Internet and its healthy development is at stake.

It is our collective duty to find a response to the Continue reading

Security Aspects of SD-WAN Solutions

Christoph Jaggi, the author of Transport and Network Security Primer and Ethernet Encryption webinars published a high-level introductory article in Inside-IT online magazine describing security deficiencies of SD-WAN solutions based on the work he did analyzing them for a large multinational corporation.

As the topic might be interesting to a wider audience, I asked him to translate the article into English. Here it is…

Read more ...

Python: the seven simple things network engineers need to know

Are you like me? Are you a network engineer, or other professional, transitioning their skill set to include programming and automation? Does your programming experience experience come from a few programming courses you attended in college a long time ago? Then please read on because I created this Python guide for people like you and me.

In this guide, I explain the absolute minimum amount you need to learn about Python required to create useful programs. Follow this guide to get a very short, but functional, overview of Python programming in less than one hour.

When you begin using Python, there are a lot of topics you do not need to know so I omit them from this guide. However, I don’t want you to have to unlearn misconceptions later, when you become more experienced, so I include some Python concepts that other beginner guides might skip, such as the Python object model. This guide is “simple” but it is also “correct”.

Getting Started

In this guide, I will explore the seven fundamental topics you need to know to create useful programs almost immediately. These topics are:

  1. The Python object model simplified
  2. Defining objects
  3. Core types
  4. Statements
  5. Simple programs
  6. Modules
  7. Continue reading

IoT vendors talk open buildings, black hats and a jam conspiracy

Welcome to what we’re hoping is the first in a long string of regular updates from the world of IoT; everything from security to platform news will be fair game, and the aim is to help you be better grounded in the rapidly expanding Internet of Things space.Schneider’s building open thingsSchneider Electric, the Andover, Mass.,-based building-infrastructure manufacturer, recently rolled out a new open framework for IoT implementations, dubbing the product EcoStruxure Building.[ Check out our corporate guide to addressing IoT security. ] It’s a software platform that makes it easy for sensors and controllers to talk to each other, even in complicated, large-scale building projects where there could be a lot of both types of devices.To read this article in full, please click here

BrandPost: How IoT is Impacting DNS, and Why It’s Scaring Both CISOs and Networking Pros

What impact is the internet of things having on enterprise networks and the way we use DNS? For many network and security pros today, the answer is “no clue,” due to the lack of source address validation combined with the explosive growth of IoT, expected to hit more than 75 billion connected devices by 2025[2].From embedded sensors laced with unknown code to devices that can exfiltrate data from otherwise secure networks, IoT devices are already leading a new wave of cyberthreats, from sensors designed with little or no thought towards security to network connectivity relying on default passwords, that can lead to cameras that query SQL databases. This blog post looks at some of the dangers with a view to how DNS can help stop them before they do harm.To read this article in full, please click here

Until we meet again…

As I wrap up my tenure at the the helm of the Internet Society on September 1,  I want to thank each and all of you for your engagement, support and friendship.  The last five years have been exhilarating—getting to know you, learning so much from you and acting together — to make the Internet better.

You have made a critical difference in strengthening and growing the Internet Society. The organization is now over 100 staff strong, serving on every continent but Antarctica.  We have grown to 126 Chapters in 108 countries, with 8 global Special Interest Groups (SIGs). The Online Trust Alliance (OTA) has joined our organizational membership and we have new and vibrant partnerships with civil society and human rights organizations. The IETF has adopted a new structure to better serve its administration. Our
youth outreach and our engagement with the Internet Hall of Fame honorees and ISOC alumni have allowed us to look to the future as we gain wisdom from those who shaped the Internet and the Internet Society. More policy makers and governmental organizations look to us for our reports, research and expertise allowing for increased dialogue and collaboration at a time when it is Continue reading

Populating New Namespaces Using Heptio Ark

Heptio Ark is a tool designed to backup and restore Kubernetes cluster resources and persistent volumes. As such, it enables users to do a bunch of very useful things like copy cluster resources across cloud providers or replicate environments for development, staging, testing, QA, etc. In this post, I’ll share a slightly different use case for Ark: populating resources into new Kubernetes namespaces.

Kubernetes namespaces, if you’re not familiar, are a way to scope resource names and provide a way to divide cluster resources between multiple resources via resource quotas (see the Kubernetes documentation on namespaces for more details). As such, when you create a new Kubernetes namespace, it’s empty. However, you may have a need or desire to have certain things present in every namespace within a cluster—for example, perhaps you have a set of ExternalName Services that point to resources outside the cluster to make it easier for applications and developers to integrate with external resources. Maybe you have a ConfigMap that developers can use to configure their applications. It could be that you want a particular secret to be present in all new namespaces so that developers don’t need to worry about managing certain credentials. In such Continue reading