Thoughts on CISA 2015 / CDT Filing

A blog post from March 4, 2015 The Center for Democracy and Technology (CDT) recently released a discussion of issues with a draft Senate Bill, called Cybersecurity Information Sharing Act of 2015 (CISA). I agree with much of CDT’s analysis. However, I disagree with some of their analysis, and some of their conclusions. First of all, I… Continue reading Thoughts on CISA 2015 / CDT Filing

Defense Against Cyber Threats: Strategies and New Developments

Webinar for MetricStream September 11, 2013 This webinar where experts Dr. Eric Burger, Director at Georgetown Center for Secure Communications and Yo Delmar, Vice President – GRC Solutions at MetricStream provide insights on the impact of cyber-security threats to the economy, national security and the critical infrastructure, the evolution of the cyber threat landscape and… Continue reading Defense Against Cyber Threats: Strategies and New Developments

SIP Security Research at Georgetown

Invited talk at SIPNOC, June 26, 2012 (Dulles, Virginia) SIPconnect™ is an important step for connecting enterprises to the SIP-enabled voice-over-IP network. One advance of SIPconnect is it requires secure signaling, out of the box. However, there is no provision for secure media. Many enterprise applications for SIP require secure communications. This is more especially… Continue reading SIP Security Research at Georgetown

Cybersecruty 2020 – Is There a Better Way to Protect the Internet

Panel at SRI International, May 23, 2012 (Arlington, VA) Alarming stories about the growing threat of cyberattacks have spurred the White House, Congress, and corporate leaders to call for more efforts to improve cybersecurity.  But are current approaches to cybersecurity working?  Can we do better?  More and more Internet technology experts argue that today’s approach is broken… Continue reading Cybersecruty 2020 – Is There a Better Way to Protect the Internet

Network Traffic Management: A Delicate Balance

Invited talk and webinar at USTelecom, February 23, 2012 (Washington, DC) Network traffic management is a collection of techniques that Internet service providers may use to attain optimum performance for a diverse set of users. These techniques include the use of performance measures to define optional service levels tailored to different user needs as well… Continue reading Network Traffic Management: A Delicate Balance

Internet 202: Why All The Fuss About Hacking the DNS?

Presented to the American Bar Association Committee 355, February 22, 2012 (Washington, DC) Is it piracy or old business models, billions of dollars lost or billions of dollars earned, or Hollywood or Silicon Valley? Understanding how the Internet and Domain Name System (DNS) works and various proposals to enhance intellectual property protection is important, no… Continue reading Internet 202: Why All The Fuss About Hacking the DNS?

USF/ICC Reform

IIT RTC Conference, October 6, 2011 (Chicago) I participated on a panel discussion on the Universal Service Fund and Inter-Carrier Compensation reform underway at the FCC. Bill Myers of Communications Daily moderated the panel. Glenn Richards of the VON Coalition and Pillsbury Law joined me. While Glenn and I agree on most things, I still… Continue reading USF/ICC Reform