Featured Blogs

Latest

The International Telecommunication Union and the Trump Administration

The question is not uncommon these days for someone who has been the principal historian on the ITU over the past 40 years. The short answer is that the institution should do just fine. Indeed, the appearance of bizarre phenomena like Trump, enhance the value and trustworthiness of a stable, globally inclusive intergovernmental venue dealing with matters that by their nature require worldwide cooperation and is buttressed by one of the most highly regarded Secretary-Generals in its history. more

Virtual Assistants Market on the Rise, Poised to Rule in 2017

In Spike Jonze's 2013 film "Her", the main character Theodore Twombly (played by Joaquin Phoenix) falls in love with a Siri-like virtual assistant. It is an intelligent computer operating system, a variance of AI envisioned by the high technology developers of today. We are still far away from creating AI capable of thinking and learning for themselves, not to mention living in symbiosis with them. However, Intelligent Virtual Assistants can be perceived as a step towards the fulfillment of the idea. more

Characterizing the Friction and Incompatibility Between IoC and AI

Many organizations are struggling to overcome key conceptual differences between today's AI-powered threat detection systems and legacy signature detection systems. A key friction area -- in perception and delivery capability -- lies with the inertia of Indicator of Compromise (IoC) sharing; something that is increasingly incompatible with the machine learning approaches incorporated into the new breed of advanced detection products. more

Counterfeit Marks and Counterfeit Goods: Pretense in Cyberspace

The term "counterfeit" is defined under U.S. trademark law as "a spurious mark which is identical with, or substantially indistinguishable from, a registered mark." 15 U.S.C. ยง 1127 (Lanham Act, Sec. 45). Used as a noun, domain names ultimately found to have been registered in bad faith make their registrants cybersquatters by definition. But more commonly we encounter counterfeiting as an adjective as it applies to spurious goods (counterfeit goods) -- "made in exact imitation of something valuable or important with the intention to deceive or defraud." more

Luddites of the 21st Century Unite, Revisited

Some years ago I wrote a post on the fact that I saw the world automate fast and did not see a lot of people worrying about the consequences for their lives. Nobody was smashing automated production lines. Smashing smartphones and laptops. In fact, embrace of new technology by the masses probably never before in history went this fast. Several and very different causes, including globalization, have led to a level of wealth that made these expensive tools and toys within reach of a vast number of people. more

Bug Bounty Programs: Are You Ready? (Part 2)

In Part 1 of "Bug Bounty Programs: Are You Ready?" we examined the growth of commercial bug bounty programs and what organizations need to do before investing in and launching their own bug bounty. In this part, we'll discuss why an organization needs to launch a bug bounty program, and what limits the value they will likely extract from such an investment. more

Dispersing a DDoS: Initial Thoughts on DDoS Protection

Distributed Denial of Service is a big deal -- huge pools of Internet of Things (IoT) devices, such as security cameras, are compromised by botnets and being used for large scale DDoS attacks. What are the tools in hand to fend these attacks off? The first misconception is that you can actually fend off a DDoS attack. There is no magical tool you can deploy that will allow you to go to sleep every night thinking, "tonight my network will not be impacted by a DDoS attack." more

Bug Bounty Programs: Are You Ready? (Part 1)

The premise of crowdsourcing the task of uncovering new bugs and vulnerabilities in an organization's web applications or consumer products sounds compelling to many. What's not to like with the prospect of "many eyes" poking and prodding away at a corporate system for a minimal reward -- and preemptively uncovering flaws that could have been exploited by hackers with nefarious intent? more

An Ethnographic Study - What are Cubans Doing Online?

Aida Zeki?, a student at the University of Uppsala, Sweden has published her master's thesis, "Internet in Public: an ethnographic account of the Internet in authoritarian Cuba." The thesis reports on interviews of 50 Cuban Internet users at nine WiFi hotspots in Havana during September and October 2016. She asked pre-planed, but mostly open-ended questions of 25 men and 25 women. She tried to identify people between 25 and 50 years old, but a few were a little older. more

FAKE45: Trump Administration Illegitimacy Under International Law

The FAKE45 sign in the photo lower right corner appearing on the front page of today's Washington Post -- ironically in front of the Department of Justice headquarters -- captures a result of yesterday's events that may have far-reaching consequences. About 4.5 million people -- including a million in Washington DC alone -- spontaneously came together from every corner of the nation and world to question the legitimacy of a Trump Administration, express disdain for its actions, and assert the repugnancy of its positions. I was there. more

Differing UDRP Decisions Show That Facts Matter

"Past performance does not necessarily predict future results." That's what the U.S. Securities and Exchange Commission requires mutual funds tell investors. But it's also true about domain name disputes. Cases in point: In four recent proceedings under the Uniform Domain Name Dispute Resolution Policy (UDRP), the operator of a large bank won two decisions but lost two others, despite a track record of having won more than 30 previous UDRP disputes. more

Help Us Answer: What Will the Internet Look Like in 10 Years?

What will the Internet look like in the next seven to 10 years? How will things like marketplace consolidation, changes to regulation, increases in cybercrime or the widespread deployment of the Internet of Things impact the Internet, its users and society? At the Internet Society, we are always thinking about what's next for the Internet. And now we want your help! more

If Slate Comes in Standard Sizes, Why Not Broadband?

Last week I was at the National Slate Museum in Wales watching slate being split apart. On the wall were sample pieces of all the standard sizes. These have cute names like "princess". For each size, there were three standard qualities: the thinnest are the highest quality (at 5mm in thickness), and the thickest have the lowest quality (those of 13mm or more). Obviously, a lighter slate costs less to transport and lets you roof a wider span and with less supporting wood, hence is worth more. more

Cyber-Terrorism Rising, Existing Cyber-Security Strategies Failing, What Are Decision Makers to Do?

While conventional cyber attacks are evolving at breakneck speed, the world is witnessing the rise of a new generation of political, ideological, religious, terror and destruction motivated "Poli-Cyber™" threats. These are attacks perpetrated or inspired by extremists' groups such as ISIS/Daesh, rogue states, national intelligence services and their proxies. They are breaching organizations and governments daily, and no one is immune. more

How a ‘Defensive Registration’ Can Defeat a UDRP Complaint

A company that registers a domain name containing someone else's trademark may be engaging in the acceptable practice of "defensive registration" if (among other things) the domain name is a typographical variation of the registrant's own trademark. That's the outcome of a recent decision under the Uniform Domain Name Dispute Resolution Policy (UDRP), a case in which the domain name in dispute, idocler.com, contained the complainant's DOCLER trademark -- but also contained a typo of the respondent's DOLCER trademark. more

Topics

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

Threat Intelligence

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days