How to prevent a “security embarrassment?”

Posted · Add Comment

On Oct 7, 2014, a security researcher, Jonathan Hall, posted details of a potential Bash/Shellshock vulnerability on Yahoo’s infrastructure: As it turned out, it was NOT a Bach/Shellshock issue. As Alex Stamos, Yahoo’s chief information security officer wrote, “it turns out that the servers were in fact not affected by Shellshock.” (see […]

Is “Transparent” Web Caching Dead?

Posted · Add Comment

Over the last few months, I’ve been re-exam the value of web caches in a network architecture. Peers have asked me to write up the results. What follows are the results. The are provided to help operators not get pushed by vendors to make costly mistakes. “Web Caching” has been an effective and productive tool […]

Weekend Read – Lessons from Heartbeed

Posted · Add Comment

IMHO “The Matter of Heartbleed” is a mandatory paper for all security professionals! It points out the dynamics of a critical Internet vulnerability and how organizations respond. As a minimum, read the conclusion. Some items to note: This work focused on web sites. There are a lot of embedded devices that are NOT getting patched. […]

Does the Internet “End” at 500K routes?

Posted · Add Comment

No! Of course, the Internet does not end at 500K routes. On August 13, 2014, there was a lot of “news” about instability issues on the Internet that might have been caused by a surge of new Internet routes (see articles like “Internet routers hitting 512K limit, some become unreliable” – The most accurate write […]

Questions to ask vendors to gauge their commitment to “secure products”

Posted · Add Comment

The Bloomberg article, “How Russian Hackers Stole the Nasdaq,” is a sobering insight into today’s risk. It should be a wake up call for all organizations in all parts of the world to understand that even the best security teams are facing an overwhelming threat. The focused expertise used by today’s cyber-criminals is often beyond the capabilities […]

Korea LTE Operators Drive an Ecosystem to Ensure Profitability

Posted · Add Comment

“Little things” matter in the telecommunications business. The difference between profitability and “just getting by” often depends on small focus innovations that increase margin, open new business opportunities, and add to the top line revenue. Attention to the “small things” are easily seen with the big Korean SPs. Their success has less to do with […]

“Getting the Right People on the Bus” Finding Staff with that Internet Spirit

Posted · Add Comment

Top Telecom Companies need people who are can ride the wave of change. Long live the Internet. The Internet Model now dominates all of telecommunications. The Internet’s End-to-End Model puts customers first. It is a model that empowers  customers to drive the change in telecommunications. Telecommunications need to convert to “IP thinking” to succeed. They […]

Cisco Data Meter

Crowd Sourcing as a Tool for Network Tuning

Posted · Add Comment

Excellent mobile customer experience is now the #1 factor keeping happy & paying customers. As the network grows in capacity, coverage, and complexity (heterogeneous network = complexity), the cost of constantly tuning the network also increases. The core mobility vendors[1] are putting forward a variety of “customer experience” tools. These tools work as an integral […]


Using DNS to Protect Your Network and Your Customers

Posted · 2 Comments

In cased you missed it, Xerocole & Damballa released two press releases on their new partnership: Xerocole’s link: Xerocole Partners with Damballa for Botnet Detection on Carrier Networks Damballa’s link: Damballa Enhances Cyber Threat Protection for Telecommunications and Internet Service Providers The Xerocole-Damballa partnership is another evolution of a security technique where the DNS recursive […]