Security Workshop in Jakarta: Understanding the Real Cyber Security Threat


This is the first in a series of Security Workshops that I will be teaching in the region. Most will be in Indonesia and other parts of ASEAN. Stay tuned or connected to me via Linkedin to get updates. Understanding the Real Cyber Security Threat Where: @ America Pacific Place Mapp – Level 3 – Jakarta Indonesia. Read More

Is “Transparent” Web Caching Dead?


Over the last few months, I’ve been re-exam the value of web caches in a network architecture. Peers have asked me to write up the results. What follows are the results. The are provided to help operators not get pushed by vendors to make costly mistakes. “Web Caching” has been an effective and productive tool Read More

Weekend Read – Lessons from Heartbeed


IMHO “The Matter of Heartbleed” is a mandatory paper for all security professionals! It points out the dynamics of a critical Internet vulnerability and how organizations respond. As a minimum, read the conclusion. Some items to note: This work focused on web sites. There are a lot of embedded devices that are NOT getting patched. Read More

Does the Internet “End” at 500K routes?


No! Of course, the Internet does not end at 500K routes. On August 13, 2014, there was a lot of “news” about instability issues on the Internet that might have been caused by a surge of new Internet routes (see articles like “Internet routers hitting 512K limit, some become unreliable” – http://arstechnica.com/security/2014/08/internet-routers-hitting-512k-limit-some-become-unreliable/). The most accurate write Read More

Don’t wait, prepare for the“Internet Skills” Gap


I’m grateful to my peers who spent the time to have coffee over this past week. We all see big changes in the industry and are really worried about the skills needed to capitalize on these changes. What follows are some thoughts that might be useful.   The severe lack of IP oriented skills is Read More

“Getting the Right People on the Bus” Finding Staff with that Internet Spirit


Top Telecom Companies need people who are can ride the wave of change. Long live the Internet. The Internet Model now dominates all of telecommunications. The Internet’s End-to-End Model puts customers first. It is a model that empowers  customers to drive the change in telecommunications. Telecommunications need to convert to “IP thinking” to succeed. They Read More

Black Hats, White Hats, Grey Hats, and now Red Hats


We all know about White Hats (Cyber Good Guys), Black Hats (Cyber Bad Guys), and Grey Hats (White Hats who skirt the edge of legality). We’re missing a group. The three defined groups are all easily described by their economic motivations for doing what they do. But we have another group who are not easily Read More