Featured Blogs

Latest

Wikileaks, the CIA, and the Press

As you've probably read, WikiLeaks has released a trove of purported CIA documents describing their hacking tools. There's a lot more that will be learned, as people work their way through the documents. For now, though, I want to focus on something that's being misreported, possibly because of deliberately misleading text by WikiLeaks itself. Here's the text from WikiLeaks... more

Work in Progress: Preparing the Next Round of New gTLDs

There are now more than a thousand new Internet suffixes alongside "the originals" (not talking vampires here, but rather .COM et al). These additional web address endings are called "new gTLDs". Since Internet technical coordinator ICANN's 2012 call for applications for the creation of new gTLDs, and their roll-out starting in 2014 when suffixes such as .BARCLAYS (brand TLD), .NYC (geo TLD) and .SKI (generic TLD) became active, the question of another round of applications has been asked repeatedly. more

Three Layers of China’s International Strategy on Cyberspace

China's newly released International Strategy on Cyberspace is marked by three distinctive layers with different degree of priority: (1) sovereignty (or cybersecurity, or UN Charter), (2) globalization (or digital economy, or WTO rules), and (3) fundamental freedoms (or human rights, or UDHR). The good point of the strategy is that it tries to make the three layers peacefully co-exist in one document. The failure, however, lies in the intentional ranking of relevance/importance of the three layers... more

ICANN Can Help China Secure Cyberspace

Before the righteous too much deride the "International Strategy of Cooperation on Cyberspace" emanating from China's cooperative one-party state, consider what progress it represents: a policy document that begins with principles, speaks often of cooperation, and clearly details the bilateral and multilateral approaches the country intends. By any measure, this is good practice from a keystone of the international system. And it offers a gift to those who would wish the Internet to be governed otherwise. more

Here is the DNSSEC Activity at ICANN 58 in Copenhagen March 12-15, 2017

Want to learn more about the current state of DNSSEC? Want to see demos of new software to secure email? Curious about the potential impact of the Root Key Rollover happening this year? Next week in Copenhagen, Denmark, ICANN 58 will include some great technical info about DNSSEC and DANE happening in several sessions. Here is the plan... more

Large Companies (Un?)knowingly Hire Spammers

This morning, CSO and MacKeeper published joint articles on a massive data leak from a marketing company. This company, River City Media (RCM), failed to put a password on their online backups sometime. This leaked all of the company's data out to the Internet at large. MacKeeper Security Researcher, Chris Vickery discovered the breach back in December and shared the information with Spamhaus and CSO online. The group has spent months going through the data from this spammer. more

Why Did’t the Internet Zap Singapore’s Straits Times Newspaper?

US papers employed 56,900 full-time journalists in 1990, the year Tim Berners Lee began testing his World Wide Web software, and they employed 32,900 in 2015. The disruption of the newspaper business began 22 years ago, when Craig Newmark launched his classified ad site, Craigslist. (Note that Newmark now generously supports investigative journalism and fact-checking organizations). Newspapers have adapted to the Internet by adding digital editions, but they generate less ad revenue than print editions have lost. more

Healthy Domains Revisited: The Pharmaceutical Industry

Users scored an exciting victory over copyright-based censorship last month, when the Domain Name Association (DNA) and the Public Interest Registry (PIR), in response to criticism from EFF, both abruptly withdrew their proposals for a new compulsory arbitration system to confiscate domain names of websites accused of copyright infringement. But copyright enforcement was only one limb of the the DNA's set of Registry/Registrar Healthy Practices. more

Into the Gray Zone: Considering Active Defense

Most engineers focus on purely technical mechanisms for defending against various kinds of cyber attacks, including "the old magic bullet," the firewall. The game of cannons and walls is over, however, and the cannons have won; those who depend on walls are in for a shocking future. What is the proper response, then? What defenses are there The reality is that just like in physical warfare, the defenses will take some time to develop and articulate. more

Notice, Takedown, Borders, and Scale

I was on the front lines of the SOPA wars, because SOPA touched on two matters of strong personal and professional importance for me: protecting the Internet infrastructure, and protecting the economy from Internet related crime. I've continued to study this field and advise industry participants in the years since then. The 2017-02-20 paper by Annemarie Bridy entitled Notice and Takedown in the Domain Name System: ICANN's Ambivalent Drift into Online Content Regulation deserves an answer, which I shall attempt here. more

Digital Geneva Convention: Multilateral Treaty, Multistakeholder Implementation

Microsoft's call for a Digital Geneva Convention, outlined in Smith's blog post, has attracted the attention of the digital policy community. Only two years ago, it would have been unthinkable for an Internet company to invite governments to adopt a digital convention. Microsoft has crossed this Rubicon in global digital politics by proposing a Digital Geneva Convention which should 'commit governments to avoiding cyber-attacks that target the private sector or critical infrastructure or the use of hacking to steal intellectual property'. more

Where Do You Start to Mitigate the Latest Destruction-Motivated Cyber Threats?

With traditional cyber strategies failing businesses and governments daily, and the rise of a new breed of destruction-motivated Poli-Cyber terrorism threatening "Survivability", what are top decision makers to do next? There is a global paradigm change in the cyber and non-cyber threat landscape, and to address it the industry has to offer innovative solutions. more

So Long, Farewell: The Worst DDoS Attacks of 2016

The year 2016 will go down in infamy for a number of reasons. It was the year an armed militia occupied an Oregon wildlife refuge, Britain voted to Brexit, an overarching event that will simply be referred to as The Election occurred, and Justin Bieber made reluctant beliebers out of all of us. 2016 was also the worst year on record for distributed denial of service (DDoS) attacks by a margin that can only be considered massive. more

Two Approaches to Routers in Space: SpaceX and OneWeb

Two companies hope to revolutionize the Internet by providing global connectivity using constellations of low-earth orbit satellites -- Elon Musk's SpaceX and Greg Wyler's OneWeb. It seems that SpaceX gets a lot more publicity than OneWeb, but both are formidable... SpaceX is integrated -- building the rockets, satellites and ground stations themselves -- while OneWeb has a number of collaborators and investors, including Bharti Enterprises, Coca-Cola, Intelsat, Hughes, Totalplay Telecommunications, Virgin Galactic and Softbank. more

Blockchain of Things Goes Global at ITU-T Dubai Meeting

Today, one of the world's largest Internet companies, Alibaba, together with a compelling array of other providers, vendors, and government bodies for the first time called for a visionary multilateral technical and operational "framework for a Blockchain of Things." The exceptionally thorough and comprehensive 23-page document, SG20-C.008, was submitted into the upcoming ITU-T SG20 Internet of Things (IoT) Study Group meeting at Dubai, 13j23 March -- the first group gathering in the organization's new 2017-2020 study period. more

Topics

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days