Featured Blogs

Latest

The Secure 5G and Beyond Act – U.S. Credibility and Legal Requirements at Stake

The Secure 5G and Beyond Act of 2020 has been submitted by the U.S. Congress to the White House for signing into law. It has been sitting there for several days now, but there are obviously more important developments demanding attention than a law compelling the Executive Branch to develop a 5G security strategy within 180 days through public and Federal agency consultations that will be implemented by the NTIA. more

The Life Cycle of Digital Certificates Reduces Again

Recently, there were news articles about a large software provider who experienced a global outage due to an expired digital certificate - and this is not the first time this kind of issue has hit the news. Digital certificate outages, when an organization forgets to replace an expiring certificate for a business-critical domain name, continues to cause business disruption and security risks. more

Apple Satellites?

Word has leaked out that Apple is working on a satellite project. The company is at the beginning of the research project, so there is no way to know exactly what they have in mind. For example, is the company considering launching satellites, or would they lease capacity from one of the other planned satellite networks? The fact that Apple is working on the concept is a good segue to discuss the many ways that satellite connectivity could be useful to Apple or other companies. more

Namecheap, EFF and the Dangerous Internet Wild West

This past week I had two items pop up on my alerts. The first was about Facebook suing domain registrar Namecheap for allowing domains that impersonate the social media company and can be used for scams. The second was a plea by the Electronic Frontier Foundation to join in its crusade to stop the sale of the .ORG domain. It took me a moment to realize these are linked. more

Why Are Internet Security Standards Badly Deployed and What to Do About It?

In 2019 under the aegis of the Internet Governance Forum, a pilot project was conducted into the causes of and solutions for the, in general, slow deployment of internet security standards. Standards that on mass deployment make the Internet and all its users safer, indiscriminately, immediately... Recently the report 'Setting the standard. For a more Secure and Trustworthy Internet. The Identification of Pressure Points in Society to Speed up Internet Standards Deployment', was published on the IGF website. more

Most Employees in Rural America Can’t Work From Home Due to Lack of Required Broadband Speeds

One of the hottest topics in the news related to coronavirus is working from home. Companies of all sizes are telling employees to work from home as a way to help curb the spread of the virus. Companies without work-at-home policies are scrambling to define how to make this work to minimize disruption to their business. Allowing employees to work at home is not a new phenomenon. more

Highlights from ICANN67 Public Forum – Community Dialogue on Proposed Transfer of PIR Ownership

Ethos CEO Erik Brooks and I are grateful to ICANN for hosting this important community dialogue on the future of PIR and .ORG earlier this week, and we listened intently to the questions posed. To echo what John Jeffrey said in his opening remarks, we are very interested in the community's input. We appreciate the openness and candor that was expressed during the Public Forum, and we would like to take this opportunity to recap a few of the overarching themes and questions asked. more

Political Email Placement or, You’re Not Special

A recent piece in The Markup called Swinging the Vote? attempts to figure out how Google decides where to deliver political e-mail. They were startled to discover that only a small fraction of it was delivered into the main inbox, and a fair amount was classed as spam. They shouldn't have been. This is an example of the fallacy We're so nice that the rules don't apply to us, which is far too common among non-profit and political mailers. more

The Sad Story of Private Public Interest Commitments (PICs)

The voluntary Public Interest Commitments (PIC) have a long and sad history at ICANN. They were a process never created or evaluated by the Multistakeholder process, thrown together for one purpose and allowed to morph into a mechanism for an almost unlimited number of un-reviewed other purposes. Disputes are delegated to a resolution process which itself was never evaluated for... more

Cyberspace Solarium Commission Report

The Cyberspace Solarium Report released today is another, in an endless string of reports, that disgorge from Washington committees dealing with the eternal mantra of "defending American interests and values in cyberspace." The challenges (and many reports) here trace back 170 years when transnational telecommunication internets emerged. The dialogue and reports scaled in the 1920s with the emergence of radio internets and cyber threats, then again in the early 1980s... more

NGO Community Urges ICANN to Exercise Independent Judgment as It Reviews the .ORG Sale

ICANN is reviewing the Internet Society's proposed sale of Public Interest Registry, the .ORG registry operator, to private equity firm Ethos Capital. ICANN effectively has the power to stop the sale by terminating PIR's Registry Agreement. The Electronic Frontier Foundation, NTEN, Consumer Reports, Americans for Financial Reform and several other organizations joined Monday's Public Forum at ICANN67 to ask questions about how ICANN plans to review the change of control of the .ORG registry... more

When Proxy Services Enable Abuse

People are growing increasingly alarmed by recent examples of bad actors abusing proxy services offered by registrars. While proxy services are designed to protect the privacy of legitimate domain name users - they do the opposite when abused by cybercriminals. Responsible Proxy providers play a key role in mitigating abuse. When they don't act responsibly - it's clear they contribute to the problem. more

Website Security: Are Quantum Computers Going to Hack My Website?

No. Now, thank you for your attention. Last year, some security researchers were discussing a doomsday scenario, that without investing in quantum encryption, there would soon be no way to feel secure over the Internet. (I would add, that a feeling of security over the Internet is misleading at best.) Allow me to break down some of these security peculiarities, which could be worrisome. more

.ORG Stewardship Council Will Ensure .ORG’s Commitment to Freedom of Expression Continues

The .ORG Stewardship Council is, in a lot of ways, a natural progression or evolution from our current PIR Advisory Council. The Advisory Council is made up of independent .ORG community members from around the world that provide advice to PIR on policy issues affecting them. The "AC," or the Advisory Council, has been a key part of PIR's work since its inception. more

The Legal Enforceability of PIR’s Public Interest Commitment

Since Ethos announced its investment in PIR last fall, Ethos has welcomed the opportunity to engage with .ORG registrants and users to hear their ideas and answer their questions. We listened to concerns expressed in the community, and we worked to address them. We announced a number of voluntary commitments that Ethos is prepared to make, and then we listened to feedback from the community on the scope of those commitments, as well as on the enforceability of those commitments. more

Topics

Threat Intelligence

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days