Featured Blogs

Latest

Prime Real Estate in the Cloud

In the physical world of real estate, value is all about location, location, location. In the virtual world of enterprise business, value is all about performance. The catch is that enterprise performance today is often driven by... location, location, location. When it comes to your digital transformation, and the migration of services to the cloud, the location of your data is paramount. To reach a customer looking to complete an on-line purchase or enable a group of employees trying to collaborate on a shared document, data needs... more

DNS, Domain Names, and Certificates: The Missing Links in Most Cybersecurity Risk Postures

In 2019, we've seen a surge in domain name system (DNS) hijacking attempts and have relayed warnings from the U.S. Cybersecurity and Infrastructure Agency, U.K.'s Cybersecurity Centre, ICANN, and other notable security experts. Although the topic has gained popularity amongst CIOs and CISOs, most companies are still overlooking important security blind spots when it comes to securing their digital assets outside the enterprise firewalls -- domains, DNS, digital certificates. more

Revisiting Reverse Domain Name Hijacking

The conduct that reverse domain name hijacking (RDNH) was crafted to punish is "using the [Uniform Domain Name Dispute Resolution Policy] in bad faith to attempt to deprive a registered domain-name holder of a domain name." There are several variations ranging from the plain vanilla, claims that should never have been brought – mark owners whose rights postdate the registration of the challenged domain name as in Vudu, Inc. v. WhoisGuard, Inc. / K Blacklock, D2019-2247... more

How to Preserve the .org Registry’s Integrity in the ISOC Sale of PIR

This article addresses the issues around the planned sale of the PIR .org registry by ISOC. It examines the history and issues plus looks at several possible paths forward, including PIR becoming a Benefit Corporation (B-Corp) and identifying possible alternative buyers who could retain PIR's non-profit status. Before Tim Bernier-Lee brought the HTML markup language to the Internet, starting in 1989, there were few registered domain names. Access for public registration started in 1986, and by December, there were about five dozen registered .com domain names.  more

The Upcoming 5G Confusion

Until now, the 5G industry has spread a lot of hype, but it hasn't affected customers. That's all starting to change as the cellular carriers are starting to offer 5G phones. Many customers who spend extra for 5G phones are going to quickly be frustrated and disappointed as they try to participate in the new 5G world. Consider both AT&T and T-Mobile. Both companies are introducing both a low-band and a high-band 5G phone, and customers who want 5G will have to choose... more

It’s Time for a Referendum on Orgxit

The worst thing about Brexit wasn't the referendum. It was the fallout. David Cameron decided that the best way to manage a small risk was to take a big one. Finally, over three agonizing years later, the UK looks set to move on. The Internet Society – which has run the .ORG domain since 2002 – was in the same position as Cameron. They became convinced that it was worth dealing with a small risk by taking a huge one. more

What’s Behind the Secure DNS Controversy and What Should You Do About It?

Anyone that has attended a meeting of the Internet Engineering Task Force (IETF) will know that the somewhat dry topic of internet protocols is often the source of passionate disagreement. But rarely does that debate extend beyond the confines of internet engineers. That has not been the case with a new protocol which aims to make the Internet's underlying domain name system more secure by default. more

Internet Reporting Hotlines Are Censoring Art as Child Sexual Abuse

This week United States Attorney-General William Barr cited the need to address child exploitation as one of the factors motivating a mooted review of law called CDA 230, which provides that Internet companies aren't responsible for what their users say or do online. There are many dimensions to the problem of child exploitation, ranging from inappropriate comments on Instagram photos to child grooming on Fortnite... more

Counting Gigabit Households

I ran across a website called the Gigabit Monitor that is tracking the population worldwide that has access to gigabit broadband. The website is sponsored by VIAVI Solutions, a manufacturer of network test equipment. The website claims that in the US, over 68.5 million people have access to gigabit broadband or 21% of the population. That number gets sketchy when you look at the details. more

Internet Governance and the Universal Declaration of Human Rights, Part 1: Foundations

One could think that the authors of The Universal Declaration of Human Rights (UDHR) -- adopted in 1948 -- had the Internet in mind when they declared in Article 19: "Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers." All human beings are entitled to certain rights, and it makes no difference if they choose to exercise them in a town square or an Internet chatroom. more

The Ghosts of Deletions Future – December 2018 Versus December 2019

In the absence of data on renewals and deletions which are yet to happen, it can be enlightening to compare the domain names from the zone files of a year ago to the domain names in the current zones. The first group is the legacy gTLDs. The "Retained" domain names are those still in the December 2019 zone files. The "Deleted" domain names are those which are no longer in the current zones. Some of the retained domain names may have been reregistered, but these are not renewals charts. more

Unpacking the Framework to Address DNS Abuse

As the Internet has grown, so too have the abuses that go along with one of the world's most transformative technologies. For all of the positives the Internet brings, negatives like phishing, malware and child exploitation are a reality online. As of December 9, 2019, 48 registrars and registries have signed onto the "Framework to Address Abuse." This initiative was launched last month by a number of domain name registries and registrars, just prior to the ICANN meeting in Montreal. more

Encryption, Our Last Line of Defense

Encryption is fundamental to our daily life. Practically everything we do online makes use of encryption is some form. Access to our financial transactions, health records, government services, and exchanged private messages are all protected by strong encryption. Encryption is the process of changing the information in such a way as to make it unreadable by anyone except for those possessing special knowledge (usually referred to as a "key"), which allows them to change the information back to its original, readable form. more

Fake Apps Are a Real Problem

In the short ten years that they've been around, mobile apps have grown to become a staple of modern digital life. With more than five million apps currently available for download in the major app stores, and with over 2,000 new apps being uploaded every day, mobile apps are big business. Fifty-eight percent of shoppers consistently browse e-commerce apps and 49% of all website traffic now comes directly from mobile app users. All this browsing directly translates into spending. more

Our Digital Illiteracy

Pew Research Center recently surveyed 4,272 adults and tested their knowledge of basic computer topics. The results showed that there was a lack of general knowledge about a few of the terms that are important for how people use the Internet. For example, the survey showed that only 30% of survey takers knew that website starting with https:// means that the information provided over that site is encrypted. Only 28% of respondents understood the concept of two-factor authentication... more

Topics

Threat Intelligence

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days