Category Archives: Internet Security
Internet access in Gaza is collapsing as ISPs fall offline – TechCrunch
Image Credits: Ahmad Hasaballah/Getty Images / Getty Images
As the conflict between Israel and Hamas reaches its third week, internet connectivity in Gaza is getting worse.
On Thursday morning, internet monitoring firm NetBlocks wrote on X, formerly Twitter, that the Palestinian internet service provider NetStream has collapsed days after the operator notified subscribers that service would end due to a severe shortage of fuel supplies.
Hours later, NetBlocks wrote that its network data showed a collapse in connectivity in the Gaza strip, including Paltel, which bills itself as the leading telecommunication company in Gaza.
Todays incident is the largest single disruption to internet connectivity we have observed in Gaza since the beginning of the conflict. It will be experienced by many as a total or near-total internet blackout, Isik Mater, director of research at NetBlocks, told TechCrunch.
According to Doug Madory, an expert who for years has worked at various companies that monitor networks across the world, internet connectivity in Gaza is dramatically worsening.
The evidence of the crippled internet in Gaza is not hard to find. By every metric of internet connectivity, things are in bad shape, Madory, who is now the director of internet analysis at Kentik, told TechCrunch.
Madory said that he monitored internet connectivity in Gaza during the 2014 war. At the time, despite some outages, the ISPs were able to keep their connections to the outside world up using backup power, etc., even if many people were unable to access service due to power outages and infrastructure failures.
NetStream did not immediately respond to a request for comment sent to its email, Facebook and WhatsApp accounts. NetStreams website appeared offline as of Friday.
Earlier on Friday, Mater told TechCrunch that Paltel and Mada Al-Arab another major regional internet provider as well as their downstreams and subsidiaries, still have a degree of connectivity although its not clear how much of this is reaching end users.
Internet security firm Cloudflare also showed issues with NetStream as of the time of writing. Cloudflare head of data insight David Belson pointed to several other ISPs that the company is monitoring, including SpeedClick, AjyalFI, DCC, Fusion, NewStarMAX, JETNET, Digital Communications Palestine and TechHub-HiNet, which are all either largely or completely offline since the first few days of the conflict.
On October 7, Hamas terrorists launched a surprise attack against Israelis in their homes, at a music festival and on the streets, killing more than 1,400 people. Since then, the Israeli military has responded with a series of airstrikes that have killed more than 7,000 people, according to the Hamas-run Gaza health ministry, though U.S. officials have called into question the accuracy of these numbers. As part of its response to the terrorist attack, Israel cut off electricity in Gaza, reportedly reducing the regions power supply by 90%.
IODA, which is a system that monitors the Internet infrastructure connectivity in near-real time, with the goal of identifying macroscopic Internet outages, is monitoring several internet providers in Palestine, including NetStream, and shows widespread outages or at least significant degradation.
The organization wrote on X that connectivity in Gaza further dropped on Friday, due to a complete outage of NetStream.
Amanda Meng, a research scientist at Georgia Tech, told TechCrunch that they are seeing a continued decline of connectivity in Gaza. Meng described the first decline beginning on October 7 with connectivity dropping to 20%, followed by a second decline early on October 21, dropping to about 15% and below.
IODA was originally developed by the Center for Applied Internet Data Analysis (CAIDA) at the University of California San Diego, and is now maintained by the Georgia Institute of Technology.
On Friday afternoon, Palestine Red Crescent Society, a humanitarian NGO in Palestine, wrote on X that it had completely lost contact with the operations room in Gaza Strip and all our teams operating there due to the Israeli authorities cutting off all landline, cellular and internet communications.
We are deeply concerned about the ability of our teams to continue providing their emergency medical services, especially since this disruption affects the central emergency number 101 and hinders the arrival of ambulance vehicles to the wounded and injured, the PRCS wrote.
Digital rights organization AccessNow has warned that internet outages in Palestine can have serious repercussions on the ground.
With thousands of people already killed, and currently in a near-complete blackout, access to information has become scarce, directly impacting the capacity to document atrocities perpetrated on the ground, the organization wrote in a press release updated last week. People find it nearly impossible to learn the whereabouts of their families and loved ones, and if theyre dead or alive.
This story has been updated to add information and comments provided by Cloudflare and NetBlocks, and with more from Isik Mater and the Palestinian Red Crescent.
Excerpt from:
Internet access in Gaza is collapsing as ISPs fall offline - TechCrunch
Companies that had their IPO in 1998 – Cantech Letter
The year 1998 was a significant one in the world of technology and finance, particularly marked by a surge in initial public offerings (IPOs) in the tech sector, fueled by the dot-com boom. This period was characterized by an unprecedented level of excitement and optimism regarding internet-based companies and the potential of the World Wide Web, which was still relatively new to the public and businesses.
During this time, investors were eager to pour money into any company that had a .com in its name, often overlooking traditional business metrics like profitability, revenue, or viable business models. The stock market saw a proliferation of tech startups going public, with their stock prices often soaring on their first day of trading, driven by high investor demand and speculation. This phenomenon led to inflated valuations of many tech companies.
Among the notable IPOs in 1998, there were some standout companies that attracted significant attention. For instance, eBay, the online auction and shopping website, had its IPO in this year, and it was a major success. The eBay IPO was emblematic of the era, demonstrating how a novel internet-based business model could capture the imagination of investors and achieve a high market valuation.
The 1998 IPO frenzy was part of a larger tech bubble that grew in the late 1990s. The excitement was based on the belief that the internet would fundamentally change business and society. However, this enthusiasm often led to overvaluation and speculation, with many investors and companies assuming that traditional business metrics could be overlooked in favor of growth and market share acquisition.
The eventual bursting of the dot-com bubble in the early 2000s led to a market correction, with many of the companies that had gone public during this period seeing their values plummet, and some going out of business entirely. The period also brought about a reevaluation of investment strategies and a more cautious approach to tech IPOs, with greater scrutiny on the fundamentals of the business, rather than the hype surrounding the internet and technology.
In summary, the IPO scene of 1998 was a hallmark of the dot-com boom, marked by a flurry of tech startups going public amidst a climate of optimism and speculation about the potential of the internet. This period played a crucial role in shaping the tech industry and the approach to tech investments in the years that followed.
Amdocs, a company known for its software and services for communications, media, and financial services providers, made its mark on the financial markets with its initial public offering (IPO) in 1998. As an IPO, Amdocs offering was a significant event, particularly because of the context in which it occurred during the dot-com boom, a period characterized by high investor enthusiasm for technology and telecommunications stocks.
Founded in Israel in 1982, Amdocs developed a reputation for providing customer care, billing, and order management systems for telecommunications carriers. By the time of its IPO, Amdocs had already established itself as a significant player in its field, serving a global client base with its software solutions. This positioning helped the company stand out amidst the numerous tech and internet-based companies that were going public around the same time.
The Amdocs IPO was noteworthy for several reasons. First, it was one of the larger IPOs of that year and attracted considerable attention from investors interested in the telecommunications sector. Unlike many tech startups going public at the time, Amdocs had a solid history of operations and a proven business model, which offered some assurance to potential investors.
Moreover, the success of the Amdocs IPO was reflective of the broader market trends. There was a high demand for shares of technology and telecom-related companies, fueled by the widespread belief that these sectors would continue to experience significant growth. Amdocs, with its established business in a vital tech sector, was well-positioned to capitalize on this investor sentiment.
The performance of Amdocs stock post-IPO was also an indicator of the companys strength. While many other companies that debuted in the market around the same period experienced turbulent journeys, especially after the dot-com bubble burst in the early 2000s, Amdocs managed to navigate these challenging times relatively well. This resilience was partly due to the companys focus on providing essential services to telecommunications companies, a sector that remained vital even during market downturns.
In conclusion, the Amdocs IPO in 1998 was a significant event in the tech and telecommunications sectors, coming at a time when investor interest in these areas was particularly high. The companys successful transition to a publicly-traded entity reflected both the strengths of its business model and the broader market enthusiasm for technology-related stocks during the late 1990s.
Broadcast.com, a pioneering internet company, had a notable moment in its history with its initial public offering (IPO) in 1998. This event was particularly significant in the context of the late 1990s, a period characterized by immense investor enthusiasm for internet-related businesses, often referred to as the dot-com boom.
Founded in 1995 by Mark Cuban and Todd Wagner, Broadcast.com specialized in online multimedia and streaming technology, providing a platform for broadcasting live and pre-recorded events over the internet. This was at a time when the concept of streaming media was in its infancy, and internet bandwidth was still a limiting factor for many users.
The Broadcast.com IPO in 1998 was one of the most successful of that era. On its first day of trading, the companys stock price soared, nearly tripling in value. This dramatic increase was a testament to the feverish investor appetite for anything related to the internet and the growing recognition of the potential of online media.
What made Broadcast.com particularly attractive to investors was its unique position in the burgeoning field of online streaming. The company was one of the first to recognize and capitalize on the potential of the internet as a medium for broadcasting events, music, and other forms of entertainment, at a time when traditional media companies were still trying to figure out their online strategies.
Broadcast.coms success post-IPO was short-lived, however, as the company quickly became a target for acquisition. In 1999, it was acquired by Yahoo! in a deal valued at $5.7 billion, one of the largest acquisitions during the dot-com era. This acquisition was seen as a strategic move by Yahoo! to enhance its multimedia and streaming capabilities and compete more effectively in the rapidly evolving digital landscape.
However, the acquisition did not realize the full potential that many had envisioned. The integration of Broadcast.com into Yahoo!s operations faced several challenges, and the expected synergies did not materialize as anticipated. Additionally, the burst of the dot-com bubble in the early 2000s led to a dramatic shift in the internet business landscape, affecting many companies, including those within Yahoo!s portfolio.
Despite its relatively brief independent existence, Broadcast.coms IPO remains a notable episode in the history of the internet. It symbolized the immense possibilities that the internet held for transforming media and entertainment, and it was a harbinger of the streaming revolution that would unfold in the years to follow. The story of Broadcast.com also serves as a cautionary tale about the volatility of the tech market, especially during periods of speculative investment frenzy like the dot-com boom.
Celestica, a key player in the electronics manufacturing services (EMS) industry, marked a significant milestone with its initial public offering (IPO) in 1998. Based in Toronto, Canada, Celestica was originally a part of IBM before becoming an independent entity, and by the time of its IPO, it had established itself as a major name in the provision of electronics manufacturing and supply chain services to a range of high-tech companies.
The timing of Celesticas IPO was crucial, as it coincided with a period of robust growth and optimism in the technology sector. The late 1990s saw a surge in demand for technology and telecommunications equipment, fueled by the dot-com boom and the expanding global internet infrastructure. This environment created a fertile ground for companies like Celestica, whose services were integral to the production of electronic components and systems for a wide array of technology products.
During its IPO, Celestica was well-received in the market, reflecting investors confidence in the EMS sector and the role of companies like Celestica in the global technology supply chain. The companys offering was seen as a solid investment, given its established customer base, which included some of the biggest names in technology, and its proven track record in managing complex manufacturing processes.
Post-IPO, Celestica continued to grow, capitalizing on the increasing trend of outsourcing in the electronics industry. Many large technology firms were looking to streamline operations and reduce costs by outsourcing manufacturing processes, and Celesticas expertise positioned it well to capture a significant share of this market.
However, the early 2000s brought challenges, as the burst of the dot-com bubble led to a downturn in the technology sector. This shift had repercussions for the EMS industry, including Celestica, as demand for electronics manufacturing services waned with the reduced pace of growth in technology spending. Like many in its sector, Celestica had to navigate these challenging economic conditions, adjusting its operations and strategy to align with the changing market dynamics.
Despite these challenges, Celesticas IPO remains an important event in the tech and manufacturing sectors, signifying the growing importance of the EMS industry in the global technology ecosystem. Celesticas evolution from an internal division of a major corporation to a publicly traded company is reflective of broader trends in technology manufacturing, where agility, specialization, and global supply chain management have become critical components of success.
Descartes Systems Group, a Canadian company specializing in logistics software, supply chain management software, and cloud-based services for logistics businesses, experienced a significant milestone with its initial public offering (IPO) in 1998. The timing of Descartes IPO was notable, as it coincided with the burgeoning interest in technology and internet-related stocks during the late 1990s, a period often referred to as the dot-com boom.
Founded in the early 1980s, Descartes Systems Group had established itself as a leader in providing innovative solutions that addressed complex logistics and supply chain challenges. The companys software solutions were designed to optimize and streamline transportation and logistics operations, making it an essential player in a rapidly globalizing economy. By the time of its IPO, Descartes had a solid customer base and a strong reputation in the logistics technology sector.
The Descartes IPO came at a time when investors were eagerly looking for growth opportunities in the technology sector. The market was particularly receptive to companies that offered internet-based solutions or services that could leverage the growing capabilities of the internet. Descartes focus on logistics software, which was increasingly becoming essential for businesses around the world as they managed complex supply chains, made it an attractive proposition for investors.
The IPO was well-received, reflecting the confidence of the market in Descartes business model and its growth potential in the burgeoning field of logistics technology. This positive response was indicative of the broader trend of investor enthusiasm for tech stocks during this era.
Post-IPO, Descartes Systems Group continued to evolve and grow, adapting to changes in the global logistics landscape. The early 2000s were challenging for many technology companies, particularly in the wake of the dot-com bubble burst. However, Descartes managed to navigate these challenges, partly due to its focus on a specialized niche in the logistics and supply chain sector, an area that remained critical despite broader economic fluctuations.
Over time, Descartes expanded its offerings, integrating cloud-based technologies and expanding its global reach. The companys growth strategy often involved strategic acquisitions that complemented and expanded its core capabilities in logistics and supply chain management.
The story of Descartes Systems Groups IPO and subsequent growth is illustrative of the opportunities and challenges faced by technology companies in the late 1990s and early 2000s. It highlights the potential for specialized software solutions in global business operations, particularly in areas like logistics and supply chain management that are crucial to the functioning of the global economy. Descartes journey from its IPO to its position as a key player in logistics technology underscores the importance of innovation, adaptability, and strategic growth in the tech sector.
DoubleClick, an internet advertising company, had a notable chapter in its corporate story with its initial public offering (IPO) in 1998. This event was especially significant in the context of the late 1990s, during the dot-com boom, a period marked by fervent investor interest in internet-related businesses.
Founded in 1996, DoubleClick quickly became a pioneer in the field of online advertising. The company developed and provided internet ad serving services, a technology that was revolutionary at the time. DoubleClicks technology allowed advertisers and publishers to track the performance of ads and manage their advertising inventory efficiently, filling a critical need in the rapidly growing world of online marketing.
The timing of DoubleClicks IPO was fortuitous, aligning with the burgeoning interest in digital advertising and the broader excitement around internet-based companies. The late 1990s saw a surge in online activity and an increasing recognition of the internets potential as a commercial platform. In this environment, DoubleClicks offering was met with considerable enthusiasm by investors who were eager to capitalize on the digital revolution.
On its first day of trading, DoubleClicks stock price soared, reflecting the high hopes and optimistic projections for the online advertising industry. This successful IPO was a testament to the perceived value and future potential of online advertising technologies and positioned DoubleClick as one of the frontrunners in this emerging field.
Post-IPO, DoubleClick continued to expand and innovate, riding the wave of the dot-com boom. The company played a significant role in shaping the online advertising landscape, introducing new technologies and strategies for ad placement and tracking. However, the early 2000s brought challenges, as the burst of the dot-com bubble led to a reevaluation of many internet-based businesses. Despite the downturn, DoubleClick managed to sustain its operations, albeit amidst a more challenging business environment.
DoubleClicks story took another significant turn in 2005, when it was acquired by private equity firm Hellman & Friedman, and later, in a landmark move, was acquired by Google in 2007 for $3.1 billion. This acquisition marked a pivotal moment in the online advertising world, solidifying Googles position in the digital advertising space and underlining the importance of ad serving technology as a key component of the online ecosystem.
DoubleClicks journey from its IPO to its eventual acquisition by Google illustrates the rapid evolution of the online advertising industry and the broader digital landscape. The companys rise, challenges, and ultimate integration into one of the worlds leading tech companies highlight the volatile nature of the tech industry, especially during periods of rapid technological change and market speculation.
eBay, the renowned online auction and shopping website, experienced a defining moment in its history with its initial public offering (IPO) in 1998. This event came at a pivotal time during the late 1990s, characterized by the dot-com boom, where investor enthusiasm for internet-related businesses was at an all-time high.
Founded by Pierre Omidyar in 1995, eBay quickly evolved from a quirky site hosting auctions for collectible items into a massive online marketplace. It gained popularity by enabling people to buy and sell a wide variety of goods and services worldwide. By the time of its IPO, eBay had already established itself as a significant player in the emerging world of e-commerce, differentiating itself with its user-friendly platform and a diverse range of products.
The timing of eBays IPO was strategic, tapping into the markets growing fascination with the internet and e-commerce. This period saw a rapid expansion in online activity and a recognition of the internets potential to transform traditional retail and commerce. eBays model of creating a virtual marketplace where anyone could buy or sell goods resonated with the public and investors alike.
When eBay went public in 1998, the response from investors was overwhelmingly positive. The IPO was a resounding success, with stock prices soaring on the first day of trading. This enthusiastic reception was a testament to the markets confidence in eBays business model and its future potential in the burgeoning e-commerce sector.
Following its IPO, eBay entered a phase of rapid growth and expansion. The company continuously enhanced its platform, introducing new features and services to improve the user experience and expand its market reach. eBays early focus on community building, customer feedback, and secure payment methods like PayPal, which it acquired in 2002, played crucial roles in its growth and the trust it built with users.
However, the journey wasnt without challenges. The early 2000s, marked by the burst of the dot-com bubble, tested the resilience of many internet companies. Despite these market upheavals, eBay managed to sustain and grow its operations, benefiting from its already established brand and a loyal user base.
eBays story from its IPO through its rapid growth encapsulates the dynamic nature of the tech industry, especially in the field of e-commerce. The companys success story became a model for online retail and has significantly influenced how people buy and sell goods over the internet. eBays evolution from a startup to a global e-commerce giant illustrates the potential of innovative business models in the digital age, particularly those that prioritize user engagement and adapt to changing market needs.
GeoCities, a web hosting service that rose to prominence in the 1990s, marked a significant chapter in the history of the internet with its initial public offering (IPO) in 1998. The GeoCities IPO was a landmark event, coming during the dot-com boom, a period characterized by intense investor interest in internet-related companies.
Founded in 1994 by David Bohnett and John Rezner, GeoCities provided a unique platform where users could create their own websites, organized into thematic neighborhoods. It was one of the first platforms to democratize web presence, allowing users with little to no technical expertise to build their own web pages. By the time of its IPO, GeoCities had grown into one of the most visited sites on the internet, renowned for its vibrant community and diverse array of user-generated content.
The IPO of GeoCities tapped into the excitement surrounding the internets potential and the growing interest in social aspects of the web. In the late 1990s, the notion of community-building online was gaining traction, and GeoCities was at the forefront of this movement. This backdrop contributed to the enthusiastic reception of GeoCities IPO, where investors saw the company not just as a web hosting service, but as a gateway to the expanding digital community and online interactions.
Upon going public in 1998, GeoCities experienced a significant surge in its stock price, reflecting the markets optimism about the future of internet communities and user-generated content. The success of its IPO highlighted GeoCities role in shaping the early internet landscape and its perceived potential for further growth.
However, the journey post-IPO was not without challenges. The company faced several issues, including mounting competition from other web hosting services, concerns over the commercialization of user-generated content, and the complexities of managing a rapidly growing online community. Despite these hurdles, GeoCities continued to be a significant player in the web hosting space.
In a major turn of events, GeoCities was acquired by Yahoo! in 1999 for approximately $3.6 billion, a move that underscored the value of web communities and user-generated content in the eyes of major internet companies. However, under Yahoo!s stewardship, GeoCities gradually lost its prominence. Changing web trends, competition, and strategic shifts at Yahoo! led to the eventual closure of GeoCities in the United States in 2009.
The story of GeoCities, from its IPO to its acquisition and eventual shutdown, offers a glimpse into the rapidly evolving nature of the internet in the late 1990s and early 2000s. It illustrates the massive potential of online communities and user-generated content, as well as the challenges inherent in sustaining and monetizing such platforms. GeoCities rise and fall is a notable example of the dynamic, often unpredictable nature of the tech industry, particularly during the speculative fervor of the dot-com era.
InfoSpace, a company that emerged during the early days of the internet, made a significant mark with its initial public offering (IPO) in 1998. This event was a key milestone, situated in the midst of the dot-com boom, an era characterized by heightened investor enthusiasm for internet-based companies.
Founded by Naveen Jain in 1996, InfoSpace specialized in providing online content and services, including search engines, email, and news, to websites and mobile device manufacturers. The companys approach was innovative for its time, focusing on syndicating and aggregating content for various third-party sites and platforms, rather than building its own consumer brand. By the time of its IPO, InfoSpace had established itself as a significant behind-the-scenes player in the burgeoning internet landscape.
The timing of InfoSpaces IPO in 1998 was strategic, tapping into the markets growing appetite for internet stocks. The late 1990s saw a rapid expansion of the internet and a widespread belief in its potential to revolutionize various industries. InfoSpace, with its diverse range of internet services and partnerships with numerous telecom and web companies, was well-positioned to capitalize on this trend.
When InfoSpace went public, the reception from investors was highly positive. The IPO was successful, with the stock price rising significantly, reflecting the markets optimism about the companys business model and the broader potential of the internet sector. This success underscored the perceived value of InfoSpaces role as an aggregator and provider of internet content and services.
Following its IPO, InfoSpace experienced a period of rapid growth, expanding its services and increasing its partnerships. The company also made a series of acquisitions, further diversifying its offerings and attempting to consolidate its position in the market.
However, the early 2000s, marked by the burst of the dot-com bubble, brought challenges for InfoSpace, as it did for many other tech companies. The industry faced a significant downturn, and InfoSpace was not immune to these market shifts. The company had to navigate through a series of strategic, financial, and legal challenges during this tumultuous period.
Despite these challenges, InfoSpace managed to endure and transform over time. It shifted its focus and rebranded several times, eventually evolving into Blucora, a provider of technology-enabled financial solutions.
The story of InfoSpaces IPO and its subsequent journey is reflective of the broader narrative of the tech industry during the late 1990s and early 2000s. It exemplifies the rapid rise and challenges faced by internet companies in an era marked by great enthusiasm and subsequent reevaluation of the dot-com sector. InfoSpaces evolution from an internet content provider to its current incarnation is a testament to the dynamic and ever-changing nature of the technology industry.
VeriSign, a company that plays a critical role in the infrastructure of the internet, had a notable moment in its history with its initial public offering (IPO) in 1998. This event was a significant one, coming at a time when the dot-com boom was in full swing, and there was immense investor excitement around internet technology companies.
Established in 1995, VeriSign quickly became known for its digital security services, primarily focusing on domain name registry services and internet security. It managed the .com, .net, and .org domain name system (DNS) registries, a crucial component of the internets infrastructure, ensuring stability and security in online communications. By the time of its IPO, VeriSign had already established a strong presence in the industry, recognized for its essential role in maintaining and securing internet domain names.
The timing of VeriSigns IPO was opportune, aligning with the rapid expansion of the internet and growing concerns about online security. In the late 1990s, as the internet began to see widespread commercial use, the need for robust security measures and reliable domain name services became increasingly evident. VeriSigns offering was therefore viewed as not just a business investment, but as an investment in the foundational elements of the digital economy.
The market responded positively to VeriSigns IPO, reflecting both the companys importance in the internet infrastructure and the overall enthusiasm for technology stocks at the time. The successful IPO demonstrated a clear recognition by the market of VeriSigns critical role and its potential for growth in an increasingly connected world.
Following its IPO, VeriSign continued to expand its services, further cementing its position as a leader in domain name registry and internet security. The company navigated through the turbulent period of the early 2000s, which saw the burst of the dot-com bubble and a subsequent reassessment of many internet-focused businesses. Despite these challenges, VeriSigns services remained in high demand, given their fundamental role in the functioning of the internet.
Over the years, VeriSign has had to adapt to changing technological landscapes and regulatory environments. The companys focus on maintaining a secure and stable internet infrastructure has led to continued investment in technology and infrastructure upgrades, ensuring it remains at the forefront of domain name and internet security services.
The journey of VeriSign, from its IPO through its evolution in the following years, underscores the critical nature of internet infrastructure services. The companys story highlights the importance of security and stability in the digital age, reflecting the ongoing need for such services as the internet continues to expand and evolve. VeriSigns sustained presence and growth in the industry exemplify the enduring value and relevance of foundational internet services in the ever-changing technology landscape.
More here:
Companies that had their IPO in 1998 - Cantech Letter
The ‘Valley of Death’ or the ‘Yellow Brick Road’? – Signal Magazine
On one side of history, the newer generation of vendors benefited greatly from the federal government. Ever heard of Fidelis, Palo Alto, ArcSight or Blue Coat? That is a partial list of startups focusing on government after Y2K. If you reviewed those companies sales for the first five-plus years of their existence, more than 50%and probably closer to 90%went to the federal government. Their products, features, staff and market position were all created by sales to the federal government with no special programs or funding avenues to take advantage of. The federal government was actually the Yellow Brick Road, not the Valley of Death.
However, before FASA/FARA, we encountered several companies that once stood as giants but eventually succumbed to the fast-changing industry. Novell, once a dominant force in networking operating systems, could not scale or adapt to meet the ever-changing market demands and lost its position to Microsoft. The browser pioneer Netscape faced a similar fate as it failed to transition effectively in fierce competition from Internet Explorer and Google. These examples teach us the importance of adaptability and the risks of stagnation in a rapidly evolving market. For both vendors as well as users, adaptability is key to survival. Maybe you have a policy that is 10 years old and unchanged. If so, you may want to look at it. This is one of the DNA factors for the government Valley of Death creation. They dont like change; they like safety and security. Industry doesnt want that. It does not make you money.
The federal governments adoption of innovative technologies has frequently presented its unique set of challenges. Centralized procurement and decision-making processes have often resulted in long sales cycles, making it challenging for the government to respond quickly to emerging technology trends. While centralization offers economies of scale, it can hinder the timely implementation of cutting-edge solutions, particularly in the face of evolving threats and opportunities. When the industry started, we needed centralization. Multiple operating systems, office suites and hardware manufacturers caused many inefficiencies and problems. That environment no longer exists, but the policies do. Does your agency test all updates before they are pushed out to all users? The blue screen of death is ancient history, but the policies to prevent it are not.
Over the years, various government initiatives have demonstrated how innovation can thrive despite the current Valley of Death challenges. The Defense Advanced Research Projects Agency (DARPA), renowned for its role in developing breakthrough technologies like the internet and GPS, showcases how targeted investments and risk-taking can revolutionize the technology landscape. Moreover, the Small Business Innovation Research (SBIR) program has nurtured numerous startups, fostering a culture of innovation within the government. But even those are large and slow programs.
Excerpt from:
The 'Valley of Death' or the 'Yellow Brick Road'? - Signal Magazine
Verizon hosts cybersecurity event at its new executive business … – Verizon
NEW YORK - Verizon Business will host a media event on Wednesday, October 18, 2023, to celebrate20 years of cybersecurity consulting services and to commemorate Cybersecurity Awareness Month. Of particular interest is a panel discussion led by industry experts, Chris Novak, Managing Director of Verizon Cyber Security Consulting; Sean Atkinson, Chief Information Security Officer at the Center for Internet Security; and Krista Valenzuela, Cyber Threat Outreach and Partnerships, NJCCIC.
The panel will featurea thought-provoking discussion on topics including data privacy, the role of AI in cybersecurity, the rise of voice security, the evolution of security controls and other relevant topics. Additionally, the panelists will discuss how local organizations in New Jersey are combating new cybercrime threats. Attendees will learn how Verizon is helping companies leverage 5G network solutions to create new, innovative technologiesto help better secure and elevate their businesses.
Raising greater awareness about cybersecurity is the first step in helping organizations defend against these threats, said Chris Novak, Managing Director of Verizon Cyber Security Consulting. Verizon is leveraging its networks broad visibility to gather, report and share actionable insights that our customers and other businesses can use to combat new, sophisticated cyberthreats involving vulnerability exploitation and social engineering.
Organizations need to go on the offensive to implement a stronger, more effective cybersecurity strategy, and then use the necessary tools to execute that strategy, said Sean Atkinson, Chief Information Security Officer at the Center for Internet Security. Many businesses are prioritizing this and are intensifying their cybersecurity efforts.
One of the ways we are harnessing the power of AI in New Jersey is in identifying malicious and suspicious websites to assist the State and its critical infrastructure in better defending against these threats. said Krista Valenzuela, Cyber Threat Outreach and Partnerships, NJCCIC.
In addition to the cybersecurity panel, there will be demos that showcase Verizonsexpertise in creating highly secure solutions. They include:
Coach-to-Coach Communications: a reliable, private wireless network solution that allows NFL coaches to communicate on the field.
Cashierless Checkout : a solution that utilizes machine learning and computer vision to enable autonomous stores at a location by incorporating 5G UWB and 5G Edge.
Private Wireless Networks:Showcasing the value of premised-based equipment and how private dedicated networks help improve business connectivity and security.
What:Verizon Cybersecurity Event
When: Wednesday, October 18th, 9:00 A.M. ET 12:00 P.M. ET.
Where: Executive Briefing Center (EBC),1 Verizon Way, Basking Ridge, NJ 07920, New Jersey.
Cybersecurity Panel: Beginning at9:00 A.M. ET,thepanel discussion will be led by Chris Novak,Managing Director of Verizon Cyber Security Consulting; Sean Atkinson, CISO at the Center for Internet Security; and Krista Valenzuela, Cyber Threat Outreach and Partnerships, NJCCIC. The panel will discuss how innovative tech is driving greater cybersecurityawareness and better business practices, followed by a media Q&A.
Read the original here:
Verizon hosts cybersecurity event at its new executive business ... - Verizon
Stay safe and secure this National Cyber Security Awareness Month … – Marquette Today
Its October and that means its time to celebrate National Cyber Security Awareness Month.
With a little knowledge, a dash of effort and a few minutes of time, you can keep your sensitive data and computer systems locked down tight. Cybersecurity does not have to be intimidating, and it does not require a large investment of time or money. In fact, you can secure your digital life with trusted free tools, and now many cybersecurity best practices can be automated.
Here are the National Cyber Security Alliances top 10 tips to stay safe online:
LEARN MORE
Spam and Phishing: Cybercriminals spend each day polishing their skills in luring people to click on malicious links or open bad attachments.
Online Shopping: Just like you would watch your wallet when at the store, its crucial to protect yourself when shopping online.
Back it Up: Protect yourself against data loss by making backups electronic copies of important files.
Malware, Botnets and Ransomware: The internet is a powerful, useful tool, but in the same way that you shouldnt drive without buckling your seat belt or ride a bike without a helmet, you shouldnt venture online without taking some basic precautions.
Romance Scams: We all know that people online arent always as they appear. However, tens of thousands of internet users fall victim to online romance scams each year, and it can happen to anyone.
Tax Time Safety: Tax season can be a stressful time for many Americans, and while scams are prevalent year-round, there is often a greater proliferation during tax time. Stay safe online while filing your taxes with these best practices, tips and resources.
Spring Clean Your Online Life: A messy digital life leaves your money, identity and personal information vulnerable to bad actors. Keep yourself and your family safe online with these quick tips for a spotless digital space.
Vacation and Travel Tips: Stay cyber safe while away from home by following some simple practices to help keep your devices safe and your vacation plans from going awry.
More information about the National Cyber Security Alliance and National Cyber Security Awareness Month can be found here.
Read the rest here:
Stay safe and secure this National Cyber Security Awareness Month ... - Marquette Today
One Year in, Public Safety Threat Alliance Plans for Growth – Government Technology
Ransomware delayed Camden County, N.J., police investigations in March and April. A cyber attack disrupting Oakland, Calif., government in February, prevented residents from filing police reports. And in May, ransomware offlined computer-assisted dispatch for the Dallas fire department.
Cyber attacks continue to threaten public safety organizations and some believe better information sharing could help the agencies prepare against and stave off such threats.
Thats something Motorola Solutions has been hoping to tackle via an information sharing and analysis organization (ISAO) it launched last year.
Now, one year in, the ISAO is working to expand its international membership, grow its information sources and provide new supports, said Jay Kaine, PSTA director and director of the Cyber Fusion Center at Motorola Solutions.
Local public safety organizations are an ideal target for cyber extortionists, Kaine said. Their intolerance for disruption and their access to the municipal budget gives them both the funds and motive to pay up. Plus, theyre small enough that attacks are unlikely to provoke a significant federal response.
Kaine said this year has seen a rise in attacks impacting 911 centers and computer-aided dispatch.
Most attacks against public safety organizations are from profit-seeking ransomware actors, he said, although Russias invasion of Ukraine also prompted a swell of hacktivism. A Motorola report found pro-Russian hacktivism groups formed after the invasion drove hacktivism against public safety agencies up 179 percent in 2022 compared to 2021.
The PSTA shares threat intelligence and advice from various sources. That includes insights Motorola gets from its security management platform, penetration testing and risk assessments. The PSTA also hopes to bring in other public safety and telecom companies to also contribute intelligence.
The ISAO additionally encourages but doesnt require members to share information about the threats they encounter, to better forewarn peers.
What we want to be able to do is get to a point that we've built up essentially this neighborhood watch for public safety, Kaine said. So that if we get an attack in a small rural county, say in Washington state because as we know [with] the Internet, you're just an IP away from getting hit; it's a global threat and we can help our members in the U.K. or, say, in western Australia, inoculate themselves and at least be prepared for what might be coming their way in this space.
Some agencies still may be wary about sharing information, however, and the ISAO tries to set minds at ease about the security and privacy of details they disclose. That includes enabling anonymous information sharing through an encrypted portal and having members indicate the sensitivity level of information using the Traffic Light Protocol.
Public safety organizations range widely in cyber maturity, from more robust regional fusion centers to small rural agencies that have only one person handling IT alongside other duties.
To meet those varied needs, the PSTA provides simple cyber posture improvement tips helpful to less mature organizations, while also making available more in-depth details for organizations able to use them. The latter could include an automated STIX/TAXII feed providing real-time threat information, which the PSTA aims to introduce early next year.
Some of the other resources include quarterly webinars and daily spot reports.
Tabletop exercises are coming next year, too. PSTA looks to hold its first in Dallas in April 2024. This initial exercise will focus on walking through high-level strategies in face of an attack and will include federal and state partners.
To date, most PSTA participants are U.S.-based, and the ISAO is looking at increasing international reach. Kaine said he hopes to see the PSTA build membership in Australia, Canada, Latin America, NATO countries and the U.K.
More here:
One Year in, Public Safety Threat Alliance Plans for Growth - Government Technology
Eastern Shore Man Sentenced to 10 Years in Federal Prison for … – Department of Justice
Baltimore, Maryland - U.S. District Judge Ellen L. Hollander today sentenced Richard Wesley Robinson, age 74, of Cambridge, Maryland, to 10 years in federal prison, followed by 25 years of supervised release, for enticement and coercion of a minor to engage in sexual activity. Judge Hollander also ordered that, upon his release from prison, Robinson must register as a sex offender in the places where he resides, is an employee, and is a student, pursuant to the Sex Offender Registration and Notification Act (SORNA).
The sentence was announced by United States Attorney for the District of Maryland Erek L. Barron and Special Agent in Charge James C. Harris of Homeland Security Investigations (HSI) Baltimore.
According to his guilty plea, prior to July 17, 2018, Robinson communicated with a 12-year-old boy, using mobile phones and the internet to arrange a meeting for sexual activity. On July 17, 2018, Robinson met the victim at a park in Easton, Maryland, where Robinson engaged in sexual activity with the child. Robinson used his cellphone to document the sexual abuse of the minor victim.
In July of 2021, the National Center for Missing and Exploited Children (NCMEC) received a CyberTip report from Snapchat, reporting that Robinsons Snapchat account had uploaded suspected child pornography. Law enforcement later executed a search at Robinsons residence and seized two cellular phones and additional electronic media. Investigators forensically examined the content of the phones seized from Robinsons residence and reviewed the content of his Snapchat and Gmail accounts after obtaining search and seizure warrants. The sexually explicit images that Robinson produced of the victim on July 17, 2018 were found on both of Robinsons cell phones. After his abuse of the victim, Robinson sent text messages to others describing his sexual abuse of the boy and used Snapchat to distribute the sexually explicit images he took of the victim to others. In addition to distributing sexually explicit images of the victim to other internet users, Robinson also engaged in sexually explicit communication regarding minors. During these communications, Robinson discussed the sexual abuse of children, including a prepubescent child who was being cared for by another Snapchat user. On June 9, 2021, Robinson received sexually explicit images depicting the sexual abuse of a two-year-old male victim from that Snapchat user. After receiving the images, Robinson asked the Snapchat user about the abuse and encouraged the Snapchat user to take some pics.
This case was brought as part of Project Safe Childhood, a nationwide initiative launched in May 2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation and abuse. Led by the United States Attorneys Offices and the Criminal Divisions Child Exploitation and Obscenity Section, Project Safe Childhood marshals federal, state, and local resources to locate, apprehend, and prosecute individuals who sexually exploit children, and to identify and rescue victims. For more information about Project Safe Childhood, please visit http://www.justice.gov/psc. For more information about Internet safety education, please visit http://www.justice.gov/psc and click on the Resources tab on the left of the page.
United States Attorney Erek L. Barron commended the HSI for its work in the investigation. Mr. Barron thanked Assistant U.S. Attorney Paul E. Budlow, who prosecuted the federal case.
For more information on the Maryland U.S. Attorneys Office, its priorities, and resources available to help the community, please visit http://www.justice.gov/usao-md/project-safe-childhood and https://www.justice.gov/usao-md/community-outreach.
# # #
Continue reading here:
Eastern Shore Man Sentenced to 10 Years in Federal Prison for ... - Department of Justice
NSA releases a repository of signatures and analytics to secure … – National Security Agency
Cyber actors have demonstrated their continued willingness to conduct malicious cyber activity against critical infrastructure by exploiting Internet-accessible and vulnerable Operational Technology (OT) assets. To counter this threat, NSA has released a repository for OT Intrusion Detection Signatures and Analytics to the NSA Cyber GitHub. The capability, known as ELITEWOLF, can enable defenders of critical infrastructure, defense industrial base, and national security systems to identify and detect potentially malicious cyber activity in their OT environments.Civilian infrastructure has become an attractive target for foreign powers attempting to do harm to U.S. interests. Because of the increase in adversary capabilities, the vulnerability of OT systems, and the potential scope of impact, NSA recommends that OT critical infrastructure owners and operators implement ELITEWOLF as part of a continuous and vigilant system monitoring program.For more detailed information, visit the ELITEWOLF page on NSAs GitHub.
ELITEWOLF is being released as a follow up to the Protect Operational Technologies and Control Systems against Cyber Attacks Cybersecurity Advisory.
NSA Media RelationsMediaRelations@nsa.gov443-634-0721
See the original post here:
NSA releases a repository of signatures and analytics to secure ... - National Security Agency
Private Internet Access expands global server network to 91 countries – IT Brief Australia
Private Internet Access (PIA), a leading provider of virtual private network (VPN) services, has announced a significant expansion of its global server network. The company now operates servers in 91 countries, up from 84, strengthening its position as a key player in the cybersecurity sector.
This announcement comes during Cybersecurity Awareness Month and reflects PIA's continued commitment to bolstering internet security and privacy on a global scale. "We are thrilled to be expanding our server network to include these exciting new locations," stated Himmat Bains, Head of Product at Private Internet Access. "Our primary focus is to think about how we can best meet the changing demands of our users, and these additions are a result of their requests."
PIAs expansion includes the introduction of servers in seven new countriesBolivia, Ecuador, Guatemala, Nepal, Peru, Uruguay, and South Korea. Notably, this move makes PIA one of the few VPN providers to have server options in all 50 US states and now even more countries around the world.
The company explained that the selection of these specific locations was based on user demand and tailored to meet unique use cases. "We also took into account regions where we saw a need for more country options and carefully considered the unique use cases for each location," Bains added.
For fans of Korean dramas and television, the addition of a South Korean server is particularly noteworthy. This new server will give users unparalleled access to K-drama and other popular Korean content, meeting the growing global demand for this genre.
Apart from adding new countries to its server network, Private Internet Access is also extending the number of dedicated IP locations, incorporating hubs in Brussels, Stockholm, Houston, and San Jose (Silicon Valley).
Dedicated IP addresses are unique IPs assigned to users, offering a smoother online experience while maintaining privacy. PIAs unique, industry-leading token-based system ensures that the users dedicated IP remains completely unlinked to their email or account. This allows users to engage in activities like accessing IP-restricted networks and conducting online transactions without the inconvenience of extra security verifications.
"At Private Internet Access, our core commitment is to deliver the highest level of online privacy and security," emphasized Himmat Bains. "We continue to look for ways to give our users the extra flexibility and accessibility they need in a rapidly changing digital landscape. As always, we remain dedicated to safeguarding our users' online activities and protecting their personal data."
The company is also renowned for its 100% open source transparency and employs RAM-only servers with military-grade 256-bit AES encryption to ensure the utmost data security. As PIA continues its efforts to improve user experience through the expansion of their server network and recent app updates on iOS, Android, and Desktop, it appears well-positioned to continue leading the way in offering a secure, private and highly accessible internet experience.
See the original post here:
Private Internet Access expands global server network to 91 countries - IT Brief Australia
Ofcom cloud report: Where the CMA should focus its probe into AWS … – ComputerWeekly.com
In this guest post, Owen Sayers, an enterprise security architect with Secon Solutions, who has 25 years experience working within the UKs internet security framework, sets out the areas where he thinks the Competition and Markets Authority (CMA) should focus its investigation into the hold that AWS and Microsoft have on the UKs cloud spend
As expected, the report published by Ofcom has resulted in the referral of the clear dominance of Microsoft and Amazon Web Services (AWS) in the UKs public cloud market to the Competition and Markets Authority (CMA).
Whilst it is right and proper that the CMA should determine its own scope for investigation, a number of areas already examined by Ofcom will undoubtedly be included.
There are, however, other areas that the CMA would be wise to include if they wish to build a full and fair view of the public cloud landscape in the UK today, and how it has been historically influenced or shaped to become what we now see.
Key areas the CMA should consider include the role and effect of UK government policy for cloud adoption, and whether the extent to which Microsoft and AWS may have been able to influence that is fair.
Successive iterations of the 2013 Cloud First policy have become progressively more prescriptive and specific in content; moving from the original position of consider cloud options first, through when we mean cloud we mean public cloud and finally to by cloud we mainly mean Software as a Service.
Taken in concert with the latest update in June 2023 , the CMA may conclude as many industry observers already do that the current distribution of cloud services in the UK, and their bulk reliance on just two global providers is largely down to HM government actions to shape the marketplace since 2014, and the ability of AWS and Microsoft to take advantage of those policies.
The CMA would also be wise to examine the means by which Microsoft took advantage of its huge desktop and server footprint in government to leverage cloud adoption after the UK published its cloud first policy in 2013.
Existing desktop end-user service licences (Windows O/S and Office suite) provided under Microsoft Enterprise Agreements were then bundled with cloud service options, enabling the transfer of users from desktop services to cloud services without new procurements or changes to contract terms.
In particular, the ability of Microsoft to transition large volumes of user identity information from desktop and server-based directories into their cloud equivalent services has given both an adoption incentive to organisations seeking to use this Microsoft licencing flexibility, and significant control to Microsoft over corporate user identity management in their cloud platforms.
It has also introduced a Microsoft-controlled technology barrier or dependency between their services and other cloud service providers and facilitated soft lock-in of organisations, due to the complexity, cost and disruption attendant with identity management changes for most customers.
The CMA might wish to examine if these individually or collectively represented use of an unfair market advantage on the part of Microsoft, which no other company could similarly enjoy.
The recently published HMG Security Classification Scheme specifically referred Government Security Advisors to Microsoft guidance and security advice ; for the first time openly listing a commercial provider as the source of technical advice for UK government security measures, a role previously uniquely held by the National Cyber Security Centre (NCSC).
Industry commentators expressed some surprise upon its publication that specific Microsoft cloud products were now listed within key Cabinet Office policies, and reflected upon both the extent to which the UK government is now dependent upon Microsoft cloud services and their potential ability to influence policy creation.
In its report, Ofcom touched upon the outputs of studies in other countries relating to concerns of governmental public cloud service use for national resilience, as well as reporting upon the decisions made by some UK Critical National Infrastructure (CNI) providers not to make use of these public cloud services since their availability and terms of service preclude such use.
In doing so those CNI providers have stepped outside of HMG policy, but their reasoning appears sound and broadly focussed on a wider public safety interest rather than self-promotion.
Whilst it may not be in the CMAs direct remit to examine these areas, the findings of the Ofcom report should be sufficient to question the extent to which core HMG services and regulated sectors have transitioned to public cloud services.
CMA may recommend that a national debate be established to examine the suitability of public cloud-based services for blue-light, CNI and core utilities. Such a recommendation, if made, would likely enjoy significant support from security advisors experienced in those areas.
Original post:
Ofcom cloud report: Where the CMA should focus its probe into AWS ... - ComputerWeekly.com