Weekend Reads 090321


In our professional practice, we are often called to perform rapid, approximate calculations without a calculator. Any available scrap of paper such as an envelope will do to scribble on.


The wireless carrier initially confirmed 47.8 million former, prospective and existing customers were impacted, but found the data of an additional 5.3 million customers was compromised.


A recent measurement study suggests that BBR is already being deployed by 22% of the Alexa Top 20k websites on the Internet.


Zero trust improves the security of IT environments as demonstrated over time by reduced attacker dwell time. The challenge many people face is understanding where to begin.


In recent months, we’ve been sharing information collected by APNIC honeypots with our community at several conferences, seminars, and workshops. ‘Information’ here basically means observations from the logs/traffic, as well as artefacts collected (such as scripts and binaries).


The Internet plays a crucial role in our increasingly digital daily lives. But who shapes and governs the patchwork that enables this essential utility? And how do their actions bear on the rights and interests of users all over the world?


We are facing the same paradox with respect to privacy and influence on the Internet. There are information items that we clearly want to protect, such as credit-card numbers. When such sensitive information is stolen via a cybersecurity breach, we clearly feel our privacy has been violated.


Graphs are, by nature, ‘unifying abstractions’ that can leverage interconnectedness to represent, explore, predict, and explain real- and digital-world phenomena.


Since 2014, IT employee turnover has been on the rise—9% in 2014, 8.6% in 2015, 8% in 2016, 7.3% in 2017, and 8.2% in 2018, with 69.9% of those being voluntary.


Network Function Virtualization (NFV) is being touted as a key component of 5G technology, with its ability to offload network functions into software that runs on industry-standard hardware and can be managed from anywhere.


By the 1990s, the orthodox view of antitrust went like this: horizontal monopolies are bad, but vertical monopolies are efficient. In other words, it was bad for consumers when one company was the single source for a good or service, but if a company wanted to own every step in the chain, that was fine. Good, even.


Microsoft is warning of a widespread credential phishing campaign that leverages open redirector links in email communications as a vector to trick users into visiting malicious websites while effectively bypassing security software.


If you are a designer of chips that are based on the most advanced processes available from Taiwan Semiconductor Manufacturing Company and your roadmap is based on the company’s continuing progress and prowess in pushing Moore’s Law to the limit, then not only is the future in your roadmaps being pushed out, but now you are going to have to pay more for whatever chips you are making now and, we suspect, the chips you are depending on for your business in the future.


The requirements are less strict now, technically, though nowhere near on the level I hoped for or expected. That includes the TPM requirement, which Microsoft is holding firm on.


SIDN Labs’ research is aimed at improving the security, stability, and resilience of the Internet infrastructure. In that context, Machine Learning plays an increasingly important role.