Featured Blogs

Latest

Doing Our Part for a Safer, Stronger DNS

Public Interest Registry is the industry leader of DNS Anti-Abuse efforts on the Internet. Since our inception, we have worked to empower people and organizations that use the Internet to make the world a better place. Whether a .ORG is the foundation of an individual voice, a global non-profit, or any organization that is part of the mission-driven .ORG community, we are proud to have earned the trust of so many dedicated users. more

Internet Society Seeks Nominations for 2020 Board of Trustees

Are you passionate about working toward a stronger, open Internet available to everyone? Do you have experience in Internet standards, technology, development or public policy? If so, please consider applying for a seat on the Internet Society Board of Trustees. The Internet Society serves a pivotal role in the world as a leader on Internet policy, technical, economic, and social matters, and as the organizational home of the Internet Engineering Task Force (IETF). more

Data, Applications, and the Meaning of the Network

Two things seem to be universally true in the network engineering space right this moment. The first is that network engineers are convinced their jobs will not exist, or there will only be network engineers "in the cloud" within the next five years. The second is a mad scramble to figure out how to add value to the business through the network. These two movements are, of course, mutually exclusive visions of the future. more

Part 2: Let’s Have an Honest Conversation About Huawei

In the first section of this piece, I argued that the anti-Huawei litany only makes sense when one realizes that it is the Chinese state, not a global telecommunication equipment manufacturer based in China, is the target of this attack. China, in this view, is an integrated monolith, and any Chinese firm can be ordered to do the government's will without any legal, political, or economic checks and balances. more

Be Wary of 5G Hardware

We've now entered the period of 5G competition where the wireless carriers are trying to outdo each other in announcing 5G rollouts. If you believe the announcements, you'd think 5G is soon going to be everywhere. Device manufacturers are joining the fray and are advertising devices that can be used with the early carrier 5G products. Buyers beware -- because most of what the cellular companies and the manufacturers are hyping as 5G is not yet 5G. more

Blasphemy: The U.S. Problem Is Huawei’s Security Is Too Good

Everyone knows the $100B/year U.S. security apparatus taps almost the entire Internet. Friendly governments help from Australia to Canada to France. Companies like AT&T, Ericsson, Verizon, and Nokia obviously cooperate. The NSA assumes that China is attempting to do the same and that Huawei, as a Chinese company, will provide assistance. The evidence suggests otherwise. Huawei is the primary opponent of U.S. security. more

Crypto Back Doors Are Still a Bad Idea

In the always interesting Lawfare blog, former FBI counsel Jim Baker in a piece called Rethinking Encryption reiterates his take on the encryption debates. There's a certain amount that makes me want to bang my head against the wall... But it's worth reading to remind us of what the other side is thinking, even with a lot of motivated reasoning that makes him conclude that Congress can pass some laws and the going dark problem will be solved. more

Defensive Domain Name Registrations – Exactly Where Should They Resolve?

Domain names can be valuable assets, but many corporate domain name portfolios consist of non-resolving domains. In a recent survey conducted by Brandsight, more than 91% of domain professionals said that ensuring domains redirect to relevant content was an extremely important or somewhat important goal. That said, it's not uncommon for less than half of corporate domain name portfolios to point to live content. more

Cybercriminals Benefitting from Stalled Privacy/Proxy Policy

We've seen alarmingly BIG increases in multiple abusive behaviors – like phishing, hacking and malware – that often leverage the domain name system (DNS) and privacy/proxy services. Cybercriminals capitalize on gaps in DNS security measures, and ICANN is holding the door open for them by failing to implement their privacy/proxy policy. If you are ever targeted, you are not alone. more

Farm Access to Broadband

The U.S. Department of Agriculture has been measuring computer usage on farms and publishes the results every two years in its Farm Computer Usage and Ownership report. The most recently released report for 2019 was compiled by asking questions to 20,000 farmers. This is a large sample from the more than 2 million farms in the country. more

Lessons From an E-Voting Debacle

There has been a significant focus over the past two years on the vulnerability and cyber threat risks faced for voting systems at the local level. That focus has typically been on State and local jurisdictions like cities, counties and towns, and resulted in the creation of the DHS Elections Infrastructure Information Sharing and Analysis Center (ISAC) to assist. However, there are other local governance entities at significant risk as well. more

Cybercriminals Weaponize Bulk-Registered Domain Names

Domain names that can be rapidly acquired, used in an attack, and abandoned before they can be traced are a critical resource for cybercriminals. Some attacks, including spam and ransomware campaigns and criminal infrastructure operation (e.g., "botnets"), benefit particularly from the ability to rapidly and cheaply acquire very large numbers of domain names – a tactic known as bulk registration. more

Key Success Factors for Top-Level Domains: An Evaluation Grid

It isn't always easy to explain the whys and wherefores of domain name market trends. Major indicators such as growth are usually generalised, given that they are based on data common to all stakeholders, but the causes behind fluctuations are hard to pin down. And structural causes need to be separated from cyclical ones, which may be the source of major variations, as was the case with the domaining waves in China, without actually reflecting long-term market trends. more

The Unbelievably High Cost of the War Against Huawei

U.S. companies were selling $11 billion a year of parts to Huawei before the blockade. Losing those sales is just the start of the damage. Every other Chinese and Russian company is making sure to find non-US suppliers. The U.S. has threatened India and Turkey with sanctions as well. As other companies replace U.S. components, the impact will be tens of billions more than the $11 billion of Huawei suppliers. more

Shame on the Regulators

It's clear that even before the turn of this century that the big telcos largely walked away from maintaining and improving residential service. The evidence for this is the huge numbers of neighborhoods that are stuck with older copper technologies that haven't been upgraded. The telcos made huge profits over the decades in these neighborhoods and ideally should not have been allowed to walk away from their customers. more

Topics

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days