Blocking Bad Internet Content – do it at the DNS

[vc_row][vc_column width=”2/3″][vc_column_text]On June 9th, Ethiopia became the latest nation state to move to legislate on Internet content.  I, for one, am sold on the idea of blocking bad internet content, especially illegal content.  Give organisations, institutions and parents control over what internet content comes through their networks. It is empowering.  It is also clear that many blanket content category bans can take you towards censorship of free speech . Did anyone follow the Australian experience over the last 8 years ?[/vc_column_text][/vc_column][vc_column width=”1/3″][vc_single_image image=”3229″ img_size=”500×300″][/vc_column][/vc_row][vc_row][vc_column width=”1/3″][vc_column_text]The flag of Ethiopia[/vc_column_text][/vc_column][vc_column width=”2/3″][vc_column_text]But this is a technology blog. So in Ethiopia, they will surely now be debating how to achieve this technically.  Two options will be discussed –  to block it on the device or  block it beforehand – in the DNS.  We may be biased, but in our opinion there is usually only one winner in such a debate – DNS.[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column width=”2/3″][vc_column_text]Every internet transaction has to be resolved by DNS – it’s the control point for the internet.  It’s easy to maintain whitelists, blacklists and regulatory compliance  at the DNS.  It is fast with low latency; it cannot be easily bypassed; and it requires nothing to be installed on the device so there are no user dependencies.

Blocking on the PC/device involves use of technology that inevitably slows performance, needs to be maintained across the enterprise and then there is the BYOD complication.

I like the elegance of DNS-based ‘decision making’.  It can be used for multiple roles in content management, authentication and user protection.[/vc_column_text][/vc_column][vc_column width=”1/3″][vc_single_image image=”2229″ img_size=”300×300″][/vc_column][/vc_row]

Infosecurity – one size fits all. Really?

[vc_row][vc_column width=”2/3″][vc_column_text]Litle shoes

InfoSecurity Europe, London,  closed its doors yesterday,  with an estimated 20,000 attendees coming through the doors over the last 3 days (up from 15,000 last year).  The investment in exhibition equipment, marketing-freebies and volume of new attendees is really impressive.  Investment money is really flowing.

But surprising to me,  9 / 10 of vendors I spoke to at the show consider the service provider industry as niche or not attractive.  So that means less vendor R&D to meet the needs specifically of the service provider industry. Will carrier grade, low CVE, 3GPP compliant, regulatory compliance products become less available outside the established hard-core service provider vendors ? I found some vendors trying to use more marketing gloss and less engineering to achieve service provider industry needs.

Take care that your vendor is not wrapping up enterprise products and putting a telco grade badge on them![/vc_column_text][/vc_column][vc_column width=”1/3″][vc_single_image image=”3215″ img_size=”300×500″][/vc_column][/vc_row][vc_row][vc_column][/vc_column][/vc_row]

Certainties in life – death, taxes and email scams…


I, for one, was totally convinced that no ‘clever’ email would ever catch me out and persuade me to click a link inviting malware insertion or similar.  So when my wife fell for the not-so-new Apple ID scam last week, I was the one picking up the pieces. I consider myself scammed. Made me think of some of the most notable examples of email scams – can you beat these top 3?

#1. The email scam that results in house buyers receiving forged bank details  at the very moment they are wiring money to buy their house.  It’s enough to crush anyone – awful.

#2.  For years, I bought my disks from Seagate. So I was rather horrified to hear that an employee fell for a phishing scam and allegedly compromised the personal data of 10,000 employees.  A major class action is now underway.

#3. There is a tsunami of phishing scams targeting and spoofing CEO’s – the most ever seen.  However, I am staggered by this example. CEO Walter Stephen lost his company $56,000,000  through an email scam and he has since been fired.  I can forgive my wife the Apple problem, but this?  Oh dear …

So isn’t it incredible that our email systems can’t provide simple, effective authentication?[/vc_column_text][/vc_column][/vc_row]