Featured Blogs

Latest

The Cyberthreats and Trends Enterprises Should Watch in 2016

Every year, Verisign iDefense Security Intelligence Services produces its Cyberthreats and Trends Report, which provides an overview of the key cybersecurity trends of the previous year and insight into how Verisign believes those trends will evolve. This report is designed to assist in informing cybersecurity and business operations teams of the critical cyberthreats and trends impacting their enterprises, helping them to anticipate key developments and more effectively triage attacks and allocate their limited resources. more

Beyond ‘Neutrality’: How to Reconnect Policy to Reality?

I have some bad news: the published literature on 'net neutrality' fails to grasp the stochastic nature of broadband and its implications. This means that the relationship of traffic management to QoE is universally misunderstood and/or misrepresented. As a result the whole policy process is being placed into opposition with nature! Nature isn't changing to accommodate the policy process. So the policy process has to change. more

Security, Backdoors and Control

Encryption is a way to keep private information private in the digital world. But there are government actors, particularly here in the US, that want access to our private data. The NSA has been snooping our data for years. Backdoors have been snuck into router encryption code to make it easier to break. Today at M3AAWG we had a keynote from Kim Zetter, talking about Stuxnet and how it spread well outside the control of the people who created it. more

Over $1 Billion in Payments Made on Venmo in January 2016

I was fascinated to read today that over $1 billion (USD) in payments were made on Venmo in January 2016. What is Venmo, you might ask? Essentially it is a mobile app (on both iOS and Android) that provides an easy payment system, in many ways like a "digital wallet" where you can securely reach in and pull out some cash to give to someone... more

DNS MythBusters - Straightening Out Common Misconceptions

Over the last couple of years, the networking industry has grown aware of the various security issues that could potentially have a huge impact on their operations. One of the topics that has raised in appeal is DNS security. Considering that much of the publicity around DNS is made by vendors trying to differentiate their solutions, there are many misconceptions out there that guide people into making poor investment in their infrastructure. more

The Growing Importance of Language in UDRP Proceedings

An increasing number of domain name disputes are being conducted in languages other than English, a trend that presents a new challenge for some trademark owners. In 2015, 85.77% of all domain names disputes at the World Intellectual Property Organization (WIPO) were conducted in English - down from an all-time average of 88.01% and a record high (in 2000) of 99.84% (disregarding 1999, the first year of the UDRP, because only one case was filed - in English -- that year). more

India’s Net Neutrality Win: Lessons for Developing Countries

On 8th February, 2015, Internet users celebrated news that the Telecom Regulatory Authority of India had passed regulation prohibiting ISPs from discriminating access to data services based on content". This directive follows similar developments in the U.S, E.U, Chile et al, and is a huge milestone in the fight for Net Neutrality: the principle that ISPs should treat all Internet traffic the same way. Meanwhile, Net Neutrality issues are not unique to India. more

Just Another ‘Black Box’? First Thoughts on Twitter’s Trust and Safety Council

On Tuesday, Twitter announced the creation of the Trust and Safety Council, a body comprising 40 organisations and individuals from civil society and academia, tasked with "ensur[ing] that people feel safe expressing themselves on Twitter". The move is clearly a response to specific criticism of Twitter and its perceived inadequacies in dealing with hate speech?-- a theme so popular and well-trodden that it recently spawned a parody account. more

Super Bowl 50 Ads Reimagined Through a New Top-Level Domain Filter

Marketers and advertisers across the world pay close attention to Super Bowl ads, for good reason. At a cost of up to $5 million for a 30-second spot, Super Bowl ads represent the world's biggest stage for high-reach, large-impact marketing. The best practices seen on Sunday will set the standard across the industry and influence marketing behavior around the world. The call to action used in any Super Bowl spot can make or break the investment. more

Why SDN is Not Enough

A hot topic in telecoms at the moment is 'software-defined networking' (SDN). This term covers a range of technologies that put networks under the control of centralised management software. But what if SDN misses the point of why broadband networks exist in the first place? Network equipment vendors are busy pushing operator CTOs to adopt a 'software telco' approach. A small army of analysts and consultants cheer this process on. more

Is the DMCA an Effective Way to Take Down Infringing Content?

As promised at an end-of-the-year (2015) announcement, the U.S. Copyright Office has now launched a comment submission process about the "safe harbor provisions" of the Digital Millennium Copyright Act (DMCA). The DMCA is often used by copyright owners to get infringing content - images, text, videos, music, even software - removed from problematic websites. more

EURid Gets .?? (Cyrillic for .eu)

EURid, who run the .eu registry, have finally been delegated .?? (Cyrillic for .eu). Punycode xn--e1a4c. One of the things that EURid is chartered to do under its contract to the European Commission was to get the extension in scripts other than Latin. EURid used ICANN's IDN ccTLD "Fast Track" process, though whether the process is truly "fast" or not is debatable, as it is still quite a long process. more

How to Choose a Cyber Threat Intelligence Provider

Throughout the course of my career I've been blessed to work with some of the most talented folks in the security and cyber threat intelligence (CTI) mission space to create a variety of different capabilities in the public, private and commercial sectors. Before I came to lead the Verisign iDefense team about five years ago, I had to evaluate external cyber-intelligence vendors to complement and expand the enterprise capabilities of my former organization. more

Smart Cities Love IPv6

I recently attended a Forum on Internet of Things in Smart Sustainable Cities: A New Age of Smarter Living staged in Singapore on 18 January 2016. The public forum provided a contextual overview to the second meeting of the ITU Study Group 20: IoT and its applications including Smart Cities and Communities which took place back-to-back with the Forum. more

Republican Presidential Candidate Upset With ICANN CEO

Republican senator and US presidential candidate Ted Cruz is not very happy with ICANN CEO Fadi Chehade. In a letter dated today, Cruz along with two other senators, have dropped some pointed questions for Chehade in relation to his involvement with a recent meeting in China... "As you must know, the World Internet Conference is not a beacon of free speech..." more

Topics

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days