Data Foundry Blog

Zero Rating Threatens the Open Internet

AT&T mergers with DirecTV, zero rating

At Data Foundry, we’re long-time advocates for open markets and the open Internet. Over the years we have worked on several efforts to protect the open Internet with rules such as those put forth in the FCC’s Open Internet Order.

Free or open market systems usually flourish with minimal regulation. However, this isn’t always the case, and it hasn’t been the case with Internet service providers. There is a lack of competition in the U.S. broadband market due to large companies dominating it by doing whatever it takes to eliminate competition and maintain their dominion. Recently, another major threat to the open Internet has been on our minds – AT&T’s historic mergers and the practice of zero-rating. So, what exactly is zero rating?

Read More

Data Foundry Speaks Up: Declares Need for Tech Committee in State Legislature

Texas legislature, state capitol

As a technology company whose founders, Ron and Carolyn Yokubaitis, were advocates before they were entrepreneurs, Data Foundry has always been involved in policy issues concerning technology and our fundamental rights.

Read More

What’s the Best Cloud Strategy?

hybrid cloud strategy

These days, companies cannot grow successfully without planning an IT infrastructure strategy. If that infrastructure fails, the company fails. It seems that most organizations are coming to the conclusion that a hybrid cloud model is the best option. According to the 451 Alliance, around 70% of organizations are currently using a multi-cloud model. RightScale’s 2016 State of the Cloud Report shows similar results with 71% of companies using a hybrid cloud model. Adoption of a hybrid cloud model increased by roughly 12% year over year.

Read More

The Cloud on Demand

shows how cloud services are like utilities

According to the 451 Alliance, SaaS (Software as a Service) is the most widely adopted type of cloud service, used by 70% of companies. This is followed by Iaas (Infrastructure as a Service) via the public cloud, which is currently utilized by 46% of companies. As the use of cloud storage and cloud applications continues to increase, there is a growing demand to connect directly to the cloud, that is, without traversing the public Internet.

Read More

5 Types of DDoS Attacks & How to Mitigate Them


A massive DDoS attack on DNS provider Dyn last Friday resulted in limited or no access for many users on major websites and platforms such as Twitter, Pardot, Spotify, New York Times, Netflix, SoundCloud and other popular websites. (Learn more about DNS in our ICANN article.) The attack was conducted using a self-replicating botnet called Mirai to infect devices connected to the Internet. Tens of millions of IP addresses were associated with the attack. This is not the first time a DNS network has fallen under attack – NSI experienced a massive, combination DDoS attack back in May that involved simple volumetric attacks to complex DNS lookup attacks.

  Read More

Shopping for Cyber Insurance? 10 Questions You Should Ask

cyber insurance risk

In a previous blog, we talked about assessing the need for cyber insurance. If your company has decided to seek coverage for cybercrime, these ten questions will help you through the rigorous process of finding the right policy based on your company’s needs and vulnerabilities.

Read More

Infographic: Determine if Cloud Storage is HIPAA-Compliant

HIPAA-compliant cloud storage snippet

Many of our customers have come to us with questions about HIPAA-compliant cloud storage. There’s a lot of marketing rhetoric online about HIPAA-certified Cloud Service Providers (CSPs) and other types of certified providers for that matter. First of all, there is no such thing as an official HIPAA certification. The Department of Health and Human Services (HHS), the organization that enforces HIPAA, does not provide HIPAA certifications, nor does it require them. This doesn’t mean that a CSP cannot be HIPAA-compliant, only that HHS does not guarantee their compliance. Also, no matter what type of certification a CSP claims to have, compliance is ultimately up to you, the “covered entity” or health services provider.

Read More

    Is Cyber Insurance a Necessity?

    malicious code, cyber insurance

    According to former NSA director Keith Alexander, cybercrime is the greatest transfer of wealth in history. With the rapid increase in the frequency of cyberattacks year after year, it’s no wonder many companies are turning to cyber insurance (also called cybercrime insurance or cyber coverage) to help mitigate losses from cyberattacks, fraud, espionage and other cyber threats. However, cybercrime insurance is still relatively new, making it risky for both the insurer and the insured. There are also several expenses related to cybercrime that insurance will not cover. Be sure to consider the following before making the decision to begin policy shopping.

    Read More

    Why We Offer Network Assessment

    network assessment diagram

    Companies often lack essential network documentation, and they don’t know where to begin with designing and optimizing their networks to align with business goals. That’s why our network engineers provided network assessments to colocation customers that expressed a need for it. Because of the improvements our network engineering team made for these first customers, the team saw the value in the contribution they could make to our customers’ IT strategies and achievement of business goals overall. As a result, we have launched network assessment as one of our official services. This is a service we offer to colocation customers and non-customers alike. Our network assessment service and network documentation provide a real transfer of knowledge through a consultative approach.

    Read More

    Ransomware & Ransom DoS: 4 Reasons You Shouldn’t Pay

    ransom money for RDoS or ransomware

    According to IDG Research, costs associated with ransomware totaled $209 million in the first quarter of this year alone. One factor contributing to the rapid increase in ransomware and DDoS threats for ransom (also known as ransom DoS or RDos) is that people and companies are paying these ransoms, allowing cyber criminals to establish a steady stream of income. What would your company do if faced with a DDoS or ransomware threat? Here are four good reasons paying up shouldn’t be an option.

    Read More
    Page 11 of 22« First...910111213...20...Last »