Featured Blogs

Latest

Regulation and Reason

Imagine living in a country where it was necessary to register with your community government by providing a copy of one of the following... This may be necessary in perhaps a large number of nations. However, as a United States citizen and resident, I was quite surprised when my local community issued the request. I investigated and found much to my dismay, that my community in fact was required by regulation to survey its residents on a biennial basis. more

In Network Security Design, It’s About the Users

One of the longstanding goals of network security design is to be able to prove that a system -- any system -- is secure. Designers would like to be able to show that a system, properly implemented and operated, meets its objectives for confidentiality, integrity, availability and other attributes against the variety of threats the system may encounter. A half century into the computing revolution, this goal remains elusive. more

Only One Week Left to Submit Nominations for PIR Board of Directors (Closes Nov 30)

If you would like to help guide the future of the Public Interest Registry (PIR), the non-profit operator of the .ORG, .NGO and .ONG domains, the deadline for nominations is MONDAY, NOVEMBER 30, 2015! After reading the information about the PIR Board requirements, you are welcome to nominate either yourself or anyone else using the PIR Nomination Form. Nominations close at 23:00 UTC on November 30, 2015, so don't delay! more

Zero Rating, a Poisoned Chalice for the Developing World

A very Interesting meeting The Internet Governance Forum (IGF) with an ambitious theme of connecting the worlds next billion people to the Internet took place in early November 2015 in a beautiful resort city of João Pessoa in Brazil under the auspice of the United Nations. Few citizens of the world paid attention to it yet the repercussions of the policy issues discussed affect us all. more

As WHOIS Transitions to RDAP, How Do We Avoid the Same Mistakes?

In 1905, philosopher George Santayana famously noted, "Those who cannot remember the past are condemned to repeat it." When past attempts to resolve a challenge have failed, it makes sense to consider different approaches even if they seem controversial or otherwise at odds with maintaining the status quo. Such is the case with the opportunity to make real progress in addressing the many functional issues associated with WHOIS. We need to think differently. more

RIPE 71 Meeting Report

The RIPE 71 meeting took place in Bucharest, Romania in November. Here are my impressions from a number of the sessions I attended that I thought were of interest. It was a relatively packed meeting held over 5 days. So this is by no means all that was presented through the week... As is usual for RIPE meetings, it was a well organised, informative and fun meeting to attend in every respect! If you are near Copenhagen in late May next year I'd certainly say that it would be a week well spent. more

USA Fibre Investments Encouraging Further Operator Expansion

According to data from the FttH Council, the number of homes passed with fibre in the US increased 13% in 2015, year-on-year, to 26 million. Combined with Canada and Mexico, the number of passed homes has reached 34 million. The take-up rate is excellent by international standards, at more than 50%. Commonly operators look to about 20% to 30% take-up before work can begin on new fibre infrastructure to communities. more

The Next ICANN CEO

Internet public policy -- and the technical ecosystem -- is at a crossroads and the choice of CEO that ICANN's board makes now is probably the most important such choice it has ever made. Since I work in Internet policy across the Geneva institutions where more than 50% of all international Internet-related policy meetings take place, and have worked at ICANN in senior positions in the past, I thought I would suggest some qualities the next CEO should have. more

How DANE Strengthens Security for TLS, S/SMIME and Other Applications

The Domain Name System (DNS) offers ways to significantly strengthen the security of Internet applications via a new protocol called the DNS-based Authentication of Named Entities (DANE). One problem it helps to solve is how to easily find keys for end users and systems in a secure and scalable manner. It can also help to address well-known vulnerabilities in the public Certification Authority (CA) model. Applications today need to trust a large number of global CAs. more

Battling Cyber Threats Using Lessons Learned 165 Years Ago

When it comes to protecting the end user, the information security community is awash with technologies and options. Yet, despite the near endless array of products and innovation focused on securing that end user from an equally broad and expanding array of threats, the end user remains more exposed and vulnerable than at any other period in the history of personal computing. more

Another Day, Another Two Million Dollars

ICANN just published the results of the auction for .HOTELS and .HOTEIS. The high bidder (I'm not sure "winner" really applies here) was Booking.com, who will use .HOTELS. The $2.2M they paid, along with the prior results, notably the $25 million Google paid for .APP, brings the total in ICANN's auction pot to about $60.5 million. There's a few more auctions scheduled for CAM, PHONE, and SHOP/SHOPPING, along with yet to be scheduled auctions for DOCTOR, INC, LLP, and LLC. more

Did We Build the ‘Right’ Internet? (An Interview with Prof Andrew Russell)

The longer I have been in the tech industry, the more I have come to appreciate the hidden complexity and subtlety of its past. A book that caught my attention is 'Open Standards and the Digital Age' by Prof Andrew Russell of Stevens Institute of Technology in New Jersey. This important work shines a fresh light on the process that resulted in today's Internet. For me, it places the standard 'triumphant' narrative of the rise of TCP/IP into a more nuanced context. more

Exploiting Video Console Chat for Cybecrime or Terrorism

A couple of days ago there was a lot of interest in how terrorists may have been using chat features of popular video console platforms (e.g. PS4, XBox One) to secretly communicate and plan their attacks. Several journalists on tight deadlines reached out to me for insight in to threat. Here are some technical snippets on the topic that may be useful for future reference. more

IGF 2015: Running in Place

The Internet Governance Forum, held this year in the Brazilian beach resort town of João Pessoa, completed its 10th annual meeting Friday November 13. The IGF Secretariat claims that nearly 5,000 people attended. Moreover, it looks as if its existence will be continued for another 10 years when the UN meets in New York later this year. Vint Cerf declared it "the best IGF ever" in the closing open microphone session. But how good is "best?" more

Looking Beyond IGF 2015 to WSIS+10

IGF 2015 in João Pessoa, Brazil will be seen as a milestone for the global Internet community. After 10 years of intense work, the Internet Governance Forum (IGF) has earned the right to celebrate its success and prepare itself for the future. As we come out of the meeting, we are urging all who want to be heard at this important moment in the evolution of the Internet to join over 110 organizations and individuals who have already signed on to a message to the UN General Assembly that will 1) help safeguard the IGF for the future; 2) preserve the multistakeholder model of governance; and 3) help keep us focused on the work at hand. more

Topics

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days