Developments in the telecommunications industry and the broader digital economy have opened up many new markets over the last few decades. Telecoms has changed from a more or less standalone, horizontally-organized industry to one that has become a key facilitator in a range of vertical markets. The keyword that is used to indicate that change is "smart." We are talking about smart transport, smart energy, smart cities and so on. more
We all live in a world where the rapid pace of innovation can be both exciting and challenging. From keeping up with the latest consumer technologies, such as new mobile apps, social media platforms, and digital assistants like Alexa to business-driven innovations like Things (IoT) to Artificial Intelligence, the one certain thing we all face is change. In the Top-Level Domain (TLD) arena, can the same be said about legacy TLDs? more
Last Thursday, during VeriSign's Q3 2019 quarterly earnings call, CEO Jim Bidzos offered statements that seemed to be carefully calibrated to satisfy Wall Street's curiosity about protracted negotiations with ICANN on a Third Amendment to the .com Registry Agreement while also appearing to distance the company from the soon-to-be forthcoming product of that year-long effort. more
Public Interest Registry is the industry leader of DNS Anti-Abuse efforts on the Internet. Since our inception, we have worked to empower people and organizations that use the Internet to make the world a better place. Whether a .ORG is the foundation of an individual voice, a global non-profit, or any organization that is part of the mission-driven .ORG community, we are proud to have earned the trust of so many dedicated users. more
Are you passionate about working toward a stronger, open Internet available to everyone? Do you have experience in Internet standards, technology, development or public policy? If so, please consider applying for a seat on the Internet Society Board of Trustees. The Internet Society serves a pivotal role in the world as a leader on Internet policy, technical, economic, and social matters, and as the organizational home of the Internet Engineering Task Force (IETF). more
Two things seem to be universally true in the network engineering space right this moment. The first is that network engineers are convinced their jobs will not exist, or there will only be network engineers "in the cloud" within the next five years. The second is a mad scramble to figure out how to add value to the business through the network. These two movements are, of course, mutually exclusive visions of the future. more
In the first section of this piece, I argued that the anti-Huawei litany only makes sense when one realizes that it is the Chinese state, not a global telecommunication equipment manufacturer based in China, is the target of this attack. China, in this view, is an integrated monolith, and any Chinese firm can be ordered to do the government's will without any legal, political, or economic checks and balances. more
We've now entered the period of 5G competition where the wireless carriers are trying to outdo each other in announcing 5G rollouts. If you believe the announcements, you'd think 5G is soon going to be everywhere. Device manufacturers are joining the fray and are advertising devices that can be used with the early carrier 5G products. Buyers beware -- because most of what the cellular companies and the manufacturers are hyping as 5G is not yet 5G. more
Everyone knows the $100B/year U.S. security apparatus taps almost the entire Internet. Friendly governments help from Australia to Canada to France. Companies like AT&T, Ericsson, Verizon, and Nokia obviously cooperate. The NSA assumes that China is attempting to do the same and that Huawei, as a Chinese company, will provide assistance. The evidence suggests otherwise. Huawei is the primary opponent of U.S. security. more
In the always interesting Lawfare blog, former FBI counsel Jim Baker in a piece called Rethinking Encryption reiterates his take on the encryption debates. There's a certain amount that makes me want to bang my head against the wall... But it's worth reading to remind us of what the other side is thinking, even with a lot of motivated reasoning that makes him conclude that Congress can pass some laws and the going dark problem will be solved. more
Domain names can be valuable assets, but many corporate domain name portfolios consist of non-resolving domains. In a recent survey conducted by Brandsight, more than 91% of domain professionals said that ensuring domains redirect to relevant content was an extremely important or somewhat important goal. That said, it's not uncommon for less than half of corporate domain name portfolios to point to live content. more
We've seen alarmingly BIG increases in multiple abusive behaviors – like phishing, hacking and malware – that often leverage the domain name system (DNS) and privacy/proxy services. Cybercriminals capitalize on gaps in DNS security measures, and ICANN is holding the door open for them by failing to implement their privacy/proxy policy. If you are ever targeted, you are not alone. more
The U.S. Department of Agriculture has been measuring computer usage on farms and publishes the results every two years in its Farm Computer Usage and Ownership report. The most recently released report for 2019 was compiled by asking questions to 20,000 farmers. This is a large sample from the more than 2 million farms in the country. more
There has been a significant focus over the past two years on the vulnerability and cyber threat risks faced for voting systems at the local level. That focus has typically been on State and local jurisdictions like cities, counties and towns, and resulted in the creation of the DHS Elections Infrastructure Information Sharing and Analysis Center (ISAC) to assist. However, there are other local governance entities at significant risk as well. more
Domain names that can be rapidly acquired, used in an attack, and abandoned before they can be traced are a critical resource for cybercriminals. Some attacks, including spam and ransomware campaigns and criminal infrastructure operation (e.g., "botnets"), benefit particularly from the ability to rapidly and cheaply acquire very large numbers of domain names – a tactic known as bulk registration. more
Sponsored byCSC
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byIPv4.Global
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byVerisign