Featured Blogs

Latest

Revisiting How Registrants Can Reduce the Threat of Domain Hijacking

Recent events have shown the threat of domain hijacking is very real; however, it is also largely preventable. As Verisign previously noted, there are many security controls that registrants can utilize to help strengthen their security posture. Verisign would like to reiterate this advice within the context of the recent domain hijacking reports. Domains are an important element of internet infrastructure; their functionality and security rely upon many factors such as their delegated name servers. more

As We Head to ICANN64 in Japan, Let’s Pay Attention to National and Global Context of the Region

Soon it'll be time again for some of us to pack our bags and head for the ICANN64 meeting in Kobe, Japan. Even if you plan to stay at home, it still will be helpful to understand the national and global context in which the meeting is taking place. One way to do that is by looking at Japan's Prime Minister's Shinzo Abe recent Keynote Speech at the World Economic Forum Annual Meeting, (Jan 23rd, 2019) entitled: "Toward a New Era of "Hope-Driven Economy" more

Banning 5G Equipment is a Foolish Strategy

It has become popular today around Washington and the venues of its coerced allies to issue threats to ban telecommunications equipment from certain countries - especially equipment intended for 5G use. The guise is vague assertions of "national security." It is an old tactic dating back to the turn of the last century and recurrent for decades. A combination of treaty instruments and collaborative industry standards activity several decades ago largely put an end to the banning tactic - significantly benefitting the entire world. more

Electronically Steerable, Flat-Panel Antennas for Satellite and Terrestrial Connectivity

What will the cost and capability of these antennas be in ten or twenty years? What would be the applications and implications of ubiquitous wireless networks? You might have some short-term guesses, like smart cities, but farther out it's science fiction -- Gaia, the Noosphere, 1984? ... Three companies, OneWeb, SpaceX and Telesat, plan to provide global, low-latency broadband Internet service using constellations of low-Earth orbit (LEO) satellites. more

Routing Security - Getting Better, But No Reason to Rest!

In January 2018, I looked back at 2017 to figure out how routing security looked globally and on a country level. Using the same metrics and methodology, I've recently taken a look at 2018 to see if we're making improvements. The good news is, it seems like the routing system is doing better! But there is still much work to be done. Using BGPStream.com, a great public service providing information about suspicious events in the routing system, I analyzed the number of incidents... more

Could Cybersecurity Become a New Driver for Business Transformation?

My involvement in the ICT industry over the last 40 years has always been to look at the strategic advantages that new technologies have to offer. I entered the industry through a proto-internet development called videotext. I looked at this technology, at what organisations could do with it, and assisted, for example, in the 1980s when the Commonwealth Bank introduced the world's first national online banking service called Telebank. more

The First Month of Cuban 3G Mobile Internet Service

ETECSA, Cuba's government monopoly ISP, is offering a number of stopgap Internet services -- navigation rooms, home DSL and WiFi hotspots, but the recently rolled out 3G mobile service is the most important. The plot to the right shows the normalized rate of Cuban domain name requests to Oracle servers during the first full month of operation - a surrogate estimate of Internet traffic volume. more

Call for Proposals: ICANN 64 DNSSEC Workshop in Kobe, Japan (March 2019)

Will you be at the ICANN 64 meeting in March 2019 in Kobe, Japan? If so (or if you can get to Kobe), would you be interested in speaking about any work you have done (or are doing) with DNSSEC, DANE or other DNS security and privacy technologies? If you are interested, please send a brief (1-2 sentence) description of your proposed presentation before 07 February 2019. more

A Look Back at the World of IP Addressing in 2018: What Changed and What to Expect

Time for another annual roundup from the world of IP addresses. Let's see what has changed in the past 12 months in addressing the Internet and look at how IP address allocation information can inform us of the changing nature of the network itself. Back in around 1992 the IETF gazed into the crystal ball and tried to understand how the internet was going to evolve and what demands that would place on the addressing system as part of the "IP Next Generation" study. more

Cybersecurity Is Failing Big-Time and This Is Hard to Fix

It has become clear that having a big cybersecurity war room is not enough to deliver true end-to-end security throughout the complex networks, systems and structures on which our modern society is based. Furthermore, looking at the forever changing draconian government interventions in this space, it is also obvious that they are often stabbing in the dark. more

Creating TLS: The Pioneering Role of Ruth Nelson

As often occurs in networking and cryptographic history, anecdotes and insularity conspire to mask how developments actually occurred, and seminal roles undertaken by women are forgotten or ignored. One of the notable examples of this proclivity occurred in the cybersecurity cryptology arena as it involves a critical platform known as the Transport Layer Security Protocol (TLS) and the pioneering role of Ruth Nelson. more

EURid Updates Post-Brexit

Brexit will impact many things. One that has not been getting much attention, however, is domain names and more specifically .eu domains. Under the current regulations, you need to be a resident of the European Union to register a .eu domain name. As I covered in a blog post last year, there is the potential for hundreds of thousand of .eu domain names being pulled overnight. more

Once Upon an EPDP

The new year has only just begun, but the work of ICANN's Expedited Policy Development Process for gTLD Registration Data (EPDP for short) is already in full swing. The team just wrapped up several days of meetings in Toronto and I thought it would be a good time for an update on where we are in the process. Before I go any further, I would be remiss if I didn't again take the opportunity to thank the ICANN team supporting our efforts. more

Protect Access to Safe Online Pharmacies Through Cyber Policy

The high cost of prescription drugs has created a health and economic crisis in the U.S. Personal prescription importation gives Americans a lifeline for affording safe medications. As prescription drug prices continue to skyrocket, the Internet has made it possible for Americans to access medications safely at considerable cost savings. As I've shared previously on CircleID, safety and affordability are the most important considerations when choosing an online pharmacy. more

Prudential Settlements for Alleged Cybersquatting/Reverse Domain Name Hijacking Under the ACPA

Given the number of awards endlessly arriving from Panels appointed to decide cybersquatting disputes under the Uniform Domain Name Dispute Resolution Policy (UDRP) (ten to fifteen published daily), the sum total of grievants filing de novo challenges under the Anticybersquatting Consumer Protect Act (ACPA) is remarkably small -- one or two at most in any single year; and those rarely proceeding to summary judgment or trial. more

Topics

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days