When a packet reaches our network, the first thing we see is where the IP address packet originates from. And we make decisions based on that IP address. —Ólafur Guðmundsson
Such practices are a thing of the past for companies that subscribe to the DevOps method of software development and delivery. New releases are frequent: often weekly or daily. Bugs are fixed rapidly. New business opportunities are sought with gusto and confidence. New features are released, revised, and improved with rapid iterations. In one case study, a company was able to provide a new software feature every 11 seconds.17 —ACM
Spam! That’s what Lorrie Faith Cranor and Brian LaMacchia exclaimed in the title of a popular call-to-action article that appeared 20 years ago in Communications. —Emilio Ferrara
Big-three credit bureau Equifax has reportedly agreed to pay at least $650 million to settle lawsuits stemming from a 2017 breach that let intruders steal personal and financial data on roughly 148 million Americans. Here’s a brief primer that attempts to break down what this settlement means for you, and what it says about the value of your identity. —Brian Krebs
There is a utopian vision shared by hard workers everywhere: One day we will look back on all our accomplishments and say “at last, the age of respite and luxury has finally arrived!” But as the forecasted luxury manifests all around us, the respite is nowhere in sight. —Saul Zimet
In 2016 Gizmodo wrote an exposé that sent shockwaves through the social media universe. An investigative reporter had discovered that employees who monitored Facebook’s trending topics were intentionally purging conservative stories from appearing in the module. —Kelly Sadler
When we use browsers to make medical appointments, share tax returns with accountants, or access corporate intranets, we usually trust that the pages we access will remain private. DataSpii, a newly documented privacy issue in which millions of people’s browsing histories have been collected and exposed, shows just how much about us is revealed when that assumption is turned on its head. —Dan Goodin
The US Department of Treasury’s Financial Crimes Enforcement Network (FinCEN) has run an analysis on suspect transactions in the past year and found that US businesses in 2018 wired around $301 million per month to business email compromise (BEC) scammers. —Liam Tung
A protocol recently released by the IETF, DNS over HTTPS (DoH), is at the centre of an increasingly polarised debate. This is because DoH uses encryption in the name of security and privacy and re-locates DNS resolution to the application layer of the Internet. This will impact cyber security, Internet consolidation, public policy issues, and our expectations of key actors in the Internet ecosystem — creating more problems than it solves at this time. —Stacie Hoffmann
But despite the fact that innovative cultures are desirable and that most leaders claim to understand what they entail, they are hard to create and sustain. This is puzzling. How can practices apparently so universally loved—even fun—be so tricky to implement? —Gary P. Pisano
Related