Featured Blogs

Latest

Watching the Watchers Watching Your Network

It seems that this last holiday season didn't bring much cheer or goodwill to corporate security teams. With the public disclosure of remotely exploitable vulnerabilities and backdoors in the products of several well-known security vendors, many corporate security teams spent a great deal of time yanking cables, adding new firewall rules, and monitoring their networks with extra vigilance. more

Moving to the Cloud? Tips for a Soft Landing

Companies are no longer afraid of the cloud. Big talk about security and performance issues has dwindled to small voices as enterprises and SMBs alike adopt cloud services to empower their global impact. Big cloud benefits, however -- agility, scalability and on-demand access -- are the result of a thoughtful, well-planned move from on-site servers to off-site resources. Here are four key tips for a soft cloud landing. more

Now We’re Talking About Some Serious Money

ICANN has now published the results of the auction for .SHOP, an eye-popping $41,501,000. This pushes the ICANN's auction pot over $100 million. That's a lot of money. There are eighteen more name contention sets that are on hold for various reasons, of which a few such as .WEB look likely to generate even more money once the hold issues are resolved. more

2015 Domain Year in Review

2015 was a challenging yet exciting year for brand owners. While new gTLDs continue to consume much of the news in the domain industry, there were other notable highlights. Global domain registrations reached nearly 300 million; ICANN had several initiatives in motion that were of particular concern to brand owners; and companies continued to face threats to their brand reputation, revenue and customer trust. Here's my top 5 domain highlights from 2015. more

Busting 3 Popular and Misleading Terms in Telecom

"Philosophy is a battle against the bewitchment of our intelligence by means of our language." (-Ludwig Wittgenstein) The words we use to describe telecoms networks often contain hidden metaphors and meanings that lead us into wrong thinking. Here are three examples... Why misleading? The word "best" implies both benevolent and optimal intentionality: the network is going to do the "right" thing for its users, and it will maximise the "rightness" in some way. more

IPv6 and DNSSEC Are Respectively 20 and 19 Years Old. Same Fight and Challenges?

A few weeks ago I came across an old interview of me by ITespresso.fr from 10 years back entitled "IPv6 frees human imagination". At the time, I was talking about the contributions IPv6 was expected to make and the challenges it had to face. After reading the article again, I realized that it has become a little dusty (plus a blurred photo of the interviewee :-)). But what caught my attention the most in the interview was my assertion: "If IPv6 does not prevail in 2006, it's a safe bet that it will happen in 2007". Wow! more

Addressing 2015 - Last One Standing!

Time for another annual roundup from the world of IP addresses. What happened in 2015 and what is likely to happen in 2016? This is an update to the reports prepared at the same time in previous years, so let's see what has changed in the past 12 months in addressing the Internet, and look at how IP address allocation information can inform us of the changing nature of the network itself. more

ITU-T - Still Living in 1924

Sometime later this year - at a venue still unknown - something short of a thousand people from around the world will gather together and engage in a now meaningless ritual almost exactly like they did in 1924. In the 1990s the name of the gathering was changed from the CCITT Plenary Assembly to a World Telecommunication Standardization Assembly (WTSA). more

Are Telcos Becoming Slum Landlords?

In the 1950s and 60s, large numbers of immigrants came to London from the Caribbean and other Commonwealth countries. They had few resources, yet needed somewhere to live. Many fell prey to exploitative landlords. These unscrupulous rentiers packed tenants into formerly swanky parts of town, which then became slums. This process even birthed a new word in British English - "Rachmanism" - to define the archetypal unethical treatment as practised by one notorious landlord. more

Blocking Shodan

The Internet is chock full of really helpful people and autonomous systems that silently probe, test, and evaluate your corporate defenses every second of every minute of every hour of every day. If those helpful souls and systems aren't probing your network, then they're diligently recording and cataloguing everything they've found so others can quickly enumerate your online business or list systems like yours that are similarly vulnerable to some kind of attack or other. more

IANA: Keeping the Ultimate Objective in Mind

Later this week, ICANN's Chartering Organizations will indicate whether they will support the third draft proposal of the CCWG-Accountability Work Stream 1 Recommendations. This is a significant moment in the IANA transition process. Support for the accountability proposal by the ICANN community will mean that we are very close to a point when the transition can move to its next phase. more

Who Will Secure the Internet of Things?

Over the past several months, CITP-affiliated Ph.D. student Sarthak Grover and fellow Roya Ensafi been investigating various security and privacy vulnerabilities of Internet of Things (IoT) devices in the home network, to get a better sense of the current state of smart devices that many consumers have begun to install in their homes. To explore this question, we purchased a collection of popular IoT devices, connected them to a laboratory network at CITP, and monitored the traffic that these devices exchanged with the public Internet. more

Federal Data Crisis: Unreliable Federal Databases are Destroying Opportunities for Small Businesses

Databases are the infrastructure of the modern administrative state and data is its lifeblood. When the data is contaminated with errors, federal agencies have difficulty performing even the most basic administrative functions such as managing its inventory of office space and protecting the personally identifiable information (PII) of social security number holders. The federal dissemination of unreliable data doesn't just waste money; it undermines public trust in government and leaves it unmanageable. more

The Promise of Connectivity at CES Means Nothing Without IPv6

For a few years now, we have been promised a bright future where connected devices all communicate with each other on the Internet of Things. If this year's CES was any indication, the consumer technology industry is just about ready to deliver on that promise with a flood of new devices and products that will transform the way we interact with technology on a fundamental level. more

Building a Strong, Sustainable Domain Name Industry - With Integrity

This week, I had the privilege of presenting at NamesCon on behalf of the Domain Name Association (DNA) -- in my position as Chair of the Board -- to provide an update on our activities and an assessment of our progress as an industry in light of the goals of the DNA. In summary, there is still a long way to go with many challenges to address. Despite this, there is much to be excited about and incredible opportunity for our combined success. Included here is a transcript of my speech. I welcome feedback and comments. more

Topics

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days