Yaana had the honor this year of presenting core material for the workshop – emanating from ETSI’s Technical Committee on Cyber Security (TC-CYBER) and a related work item for which Yaana is responsible.
Broadband Consumer Privacy Changes and Implications for Internet Service Providers for Business Intelligence
On March 23, 2017, the Senate approved a resolution to undo Obama administration Federal Communications Commission (FCC) rules relating to internet privacy and Internet Service Provider (ISP) ability to collect, use, and share this information which puts ISPs on equal footing with over-the-top (OTT) service providers like Google and Facebook under Federal Trade Commission (FTC) requirements.
The advent of digital telephony has revolutionized office communications. Now, instead of a single office number and extension numbers, each office desk phone could have its own direct dial number. Now, when somebody calls you, their desk number can be displayed and you know exactly who is calling you.
Arguably the most significant cybersecurity development of 2015 was a stunner. On Friday, 18 December 2015 – with everyone leaving on the holidays – the U.S. Congress unexpectedly passed the Cybersecurity Act of 2015 and it was immediately signed by the President. It became the organic law of the United States, including far reaching amendments to the Homeland Security Act of 2002.
Wireless infrastructure networks are constantly evolving. Often mobile service providers must maintain multiple generations in order to support new and legacy services. Unfortunately we don’t see this getting any easier anytime soon with the emergence of VoLTE and 5G on the horizon.
Earlier this week on 9 November at a public location outside Washington DC, a U.S. Department of Homeland Security sponsored Initial Public Meeting was held for establishing Information Sharing and Analysis Organization (ISAO) Standards. After some initial speeches by DHS officials, the contractor host of the meeting described the efforts and sought to gather information and ideas from the approximately 50+ attendees.
This contribution describes the move toward more secure and trusted websites based on strong digital certificates, CA/browser industry actions, and very recent changes by some browser vendors to enforce the transition away from now depreciated weak certificates.