Featured Blogs

Latest

Humans’ Best Defense Against Cybersecurity

At regular intervals, I have discussed the cybersecurity situation in Australia. In those assessments, I wrote about my frustration that the previous government policies more or less resembled a fire brigade approach. Trying to address individual incidents with regulations and legislation rather than coming up with a holistic strategy. more

Amazon’s Huge IoT Network

In a recent blog post, Amazon invited developers to test drive its gigantic IoT network. This network has been labeled 'Sidewalk' and was created by tying together all of Amazon's wireless devices like Amazon Echos and Ring cameras. Amazon claims this huge wireless network now covers 90% of U.S. households. Amazon created the network by transmitting Bluetooth and 900 MHz LoRa signals from its various devices. more

Adding ZONEMD Protections to the Root Zone

The Domain Name System (DNS) root zone will soon be getting a new record type, called ZONEMD, to further ensure the security, stability, and resiliency of the global DNS in the face of emerging new approaches to DNS operation. While this change will be unnoticeable for the vast majority of DNS operators (such as registrars, internet service providers, and organizations), it provides a valuable additional layer of cryptographic security to ensure the reliability of root zone data. more

UN and the Global Digital Compact: How to Strengthen the IGF?

According to UN Secretary-General Antonio Guterres, the forthcoming UN World Summit on the Future", scheduled for September 2024, should adopt a "Global Digital Compact" (GDC).1 The GDC is part of the so-called "UN Common Agenda." The compact is expected to "outline shared principles for an open, free and secure digital future for all" and to cover issues as digital connectivity, avoiding Internet fragmentation, providing people with options as to how their data is used... more

The Problem Of 5G Hype

I'm writing this as the 5G hype cycle reaches a new crescendo. What is most striking is how few of those touting 5G (or "private 5G") is how little technical detail there is beyond saying it is the next generation of cellular protocols. Yes, one can look at volumes of specifications with myriad options and flavors but no sense of 5G as such. That alone should make one suspicious - why does one have to eschew wires to get 5G? more

Return of Net Neutrality: Discussion of European Net Neutrality Proposal Relevant for U.S. Broadband Market

There is an interesting recent discussion in Europe about net neutrality that has relevance to the U.S. broadband market. The European Commission that oversees telecom and broadband has started taking comments on a proposal to force content generators like Netflix to pay fees to ISPs for using the Internet. I've seen this same idea circulating here from time to time, and in fact, this was one of the issues that convinced the FCC first to implement net neutrality. more

ICANN: Governance & Authority

It is almost 25 years since the Internet was privatized by the U.S. government. ICANN was formed by Esther Dyson and Jon Postel as a California-based non-profit with the responsibility to administer the Internet. However, the U.S. government retained limited control, primarily through the Internet Assigned Numbers Authority (IANA). It was the revelations, in 2013, of highly classified National Security Agency (NSA) documents by Edward Snowden that sparked global concerns over the U.S. dominance of the Internet.  more

Risk vs Benefit: The Impact of Shorter 90-Day SSL Certificate Life Cycles

In today's digital age, securing your website and ensuring your users' safety has never been more critical. Secure sockets layer (SSL) certificates are the go-to solution for securing websites by encrypting the data transmitted between web servers and browsers. Historically, SSL digital certificates could be valid for years, after which they had to be renewed or replaced.  more

U.S. National Cybersecurity Strategy and Its Impact on Domain Security

Last month, the U.S. National Cybersecurity Strategy was launched, providing a new roadmap for stronger collaboration between those operating within the digital ecosystem. The strategy calls on software makers and American industry to take far greater responsibility to assure that their systems cannot be hacked while accelerating efforts by the Federal Bureau of Investigation and the Defense Department to disrupt the activities of hackers and ransomware groups around the world. more

Minimized DNS Resolution: Into the Penumbra

Over the past several years, domain name queries - a critical element of internet communication - have quietly become more secure, thanks, in large part, to a little-known set of technologies that are having a global impact. Verisign CTO Dr. Burt Kaliski covered these in a recent Internet Protocol Journal article, and I'm excited to share more about the role Verisign has performed in advancing this work and making one particular technology freely available worldwide. more

Processing Domain Data to Improve Business Continuity as a Domain Name Registry

In the fall of 2022, around 9,000 numeric domain names such as 0146.se, 0148.se, 0149.se, and so on were registered in the .SE zone. These domains were registered with two registrars, Register.eu and 1API. They had the same kind of SSL certificate, and there were other similarities among them that strongly suggested they were connected. All these domains were registered after September 1, 2022, but not on the same date... more

Is the Broadband Industry Reaching Maturity?

Craig Moffett, of MoffettNathanson, was recently quoted in FierceTelecom asking if the broadband industry is reaching maturity. Other than in rural areas, where many homes are still hungry for better broadband, the broadband penetration rate in cities is approaching 90%. It's a fair question to ask if there is room for much more growth in the industry. This is a question that has bounced around for the last five years. more

An Extortionists Fire Sale of TikTok to a US Company Would Be Un-American and Futile

In the latest twist of the US-China spat, President Trump has his sights on TikTok, the short-form video-sharing platform and ByteDance subsidiary. On July 31, President Trump threatened to ban TikTok because it was a threat to US national security. On August 6, he made good on his threat when he signed an Executive Order to that effect. President Trump tightened the screws with an August 14 Executive Order requiring ByteDance to divest its assets in the US and destroy any TikTok data on its US users within 90 days. more

We Can Have Forever URLs

A Forever URL is one that never expires. You own it and needn't worry about forgetting to renew it. The term itself is inspired by the US Forever Stamps, which you can use even if the postal rate goes up. This article looks at the underlying mechanisms for linking such information and is aimed at a technical audience. The DNS isn't just about websites; it is fundamental to how we connect endpoints, be they websites, devices, documents etc. more

Opinion: IP Leasing Should Become a Market Standard

The Regional Internet Registry (RIR) for the Asia-Pacific region (APNIC) recently held its 55th meeting in conjunction with APRICOT, from 20 February to 2 March 2023, in Manila, USA. One of the critical discussions at the conference was centered on the APNIC policy that does not accept IP leasing and has a questionable understanding of its necessity. According to the APNIC policy manual, which was referenced during the meeting, APNIC allocates and assigns resources based on need, and 'leasing is not allowed' nor does it form a basis for further need. more

Topics

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

Threat Intelligence

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days