Featured Blogs

Latest

DotConnectAfrica Trust Response to John Jeffrey’s ICANN Legal Blog Posting

The attention of DotConnectAfrica Trust (DCA Trust) has been drawn to a recent blog posting by John Jeffrey, the ICANN General Counsel and Company Secretary, who wrote to clarify what he termed as "misinformation and erroneous reporting that have framed parts of the discussion" regarding the recent DCA vs. ICANN IRP Final Declaration. As we can't see a way of making comments on his blog, DCA Trust as a directly affected party, will respond to the issues Mr. Jeffrey has advanced... more

ICANN Should Curb Anonymous Domain Name Abuses

E-commerce has revolutionized how businesses sell to consumers -- including those involved in illicit activities, such as websites peddling illegal narcotics, pirated movies and music, or counterfeit handbags. For example, 96 percent of Internet pharmacies do not comply with U.S. laws, and as they ship pills tainted with paint thinner, arsenic, and rat poison, they put the health and safety of consumers at risk. Why don't law enforcement officials do more to combat this problem? Partly because of the difficulty of identifying who is actually operating the illegal pharmacies. It is time to fix this, while allowing anonymity for those who deserve it. more

Costly Domain Name Price Comparison Sites

Price comparison sites, including those for domain registrations, are supposed to benefit buyers. Do they? Recent theory and practice suggest a friend-and-foe relationship. Comparison sites introduce an entire layer of costs, notably including the sites' marketing costs. more

Have New Domains Had Our Twerking Moment?

There's a lot of .buzz about Google's new holding company, Alphabet. From .NYC to .London to .Tokyo the "new Google" story is making .news everywhere, as the .media large and small speculates on what it means for the .online and .tech industries, and beyond. After all, as one of the .top brands and companies in the .world, when Google makes a move it can have .global impact. more

Challenges for .brands - How to Engage Internal Stakeholders

Developing a .brand TLD strategy requires resources and input from almost every function in your organisation. Unfortunately, most organisations that applied for a .brand TLD have successfully de-prioritised the project to the point where even the executives who signed off on the project in 2011/2012 may need to be reminded what it is. Funding allocation may or may not still exist. Your digital brand roadmap may or may not include reference to the TLD. more

Global IPv6 Summit to Be Held on September 7th 2015

September 7th 2015 will see the Global IPv6 Next Generation Internet Summit 2015 (hereinafter referred to as IPv6 Summit) held in the Presidential Hotel Beijing. The conference will be co-hosted by the IPv6 Forum and BII Group, under the theme of "IPv6 approaching, are you ready?," which will be well attended by top-notch industrial experts both at home and abroad, hundreds of representatives from carriers across the globe, representatives of well-known vendors in the industry, experts from academic agencies, enterprise users, and many influential news outlets, who will discuss the mainstream plans and technical foci of large-scale IPv6 deployment, influence and challenges brought by IPv6 development on network security, Global Internet of Things boosted by IPv6, and other burning issues. more

The Internet of Things: When Sci-Fi Becomes Reality

In my last blog post I shared some of the general security challenges that come with the Internet of Things (IoT). In this post, I will focus on one particular security risk: distributed denial of service (DDoS) attacks. Even before the age of IoT, DDoS attacks have been turning multitudes of computers into botnets, attacking a single target and causing denial of services for the target's users. By "multitudes" we can be talking about thousands or even millions of victim devices. Now add IoT into the equation... more

Tips for Managing Your Company’s Shadow IT Issues

Shadow IT -- the use of unsanctioned software and services by employees -- is a problem. It's a big one. According to Forbes, 72 percent of executives don't know how many "shadow" apps are being used on their network. Beyond overloading network resources and impacting data compliance, there is also the real threat of security breaches from unapproved apps. Managing IT you can't see is no easy task, but fortunately it's not impossible. Here are five tips to help bring light to the shadows. more

Are Botnets Really the Spam Problem?

Over the last few years I've been hearing some people claim that botnets are the real spam problem and that if you can find a sender then they're not a problem. Much of this is said in the context of hating on Canada for passing a law that requires senders actually get permission before sending email. Botnets are a problem online. They're a problem in a lot of ways. They can be used for denial of service attacks. They can be used to mine bitcoins... more

The IANA Stewardship Transition - Now Is the Time to Share Your Views

The IANA Stewardship Transition process may have started more than a year ago, but last week it reached its pinnacle with the publication of the compiled Proposal to Transition the Stewardship of the Internet Assigned Numbers Authority (IANA) Functions from the US Commerce Department's National Telecommunications and Information Administration (NTIA) to the Global Multistakeholder Community" by the IANA Coordination Group (ICG). more

ICANN Wins a Very Weak TLD Lawsuit

Back in the 1990s as the Internet was starting to become visible to the world, several people had the bright idea of setting up their own top level domains and selling names in competition with what was then the monopoly registrar Network Solutions (NSI). For these new TLDs to be usable, either the TLD operators had to persuade people to use their root servers rather than the IANA servers, or else get their TLDs into the IANA root. Attempts to get people to use other roots never were very successful... more

From Toad to Princess - New TLDs Are No Magical Wand in the Kingdom of Search Engines

Google has posted details on Ranking of new gTLDs (new gTLDs) in search. John Mueller, Webmaster Trends Analyst, said that new gTLD's will be treated the same as other gTLD's such as .com. He stated: "Overall, our systems treat new gTLDs like other gTLDs (like .com & .org). Keywords in a TLD do not give any advantage or disadvantage in search." The ambiguous use of the word "overall" in the statement, may leave some doubt as to whether the 600 .brands -- new domain extensions operated by brand owners -- are included or excluded in any VIP search ranking treatment. more

Call for Participation - DNSSEC Workshop at ICANN 54 in Dublin, Ireland

Would you like to present an idea you have related to DNSSEC or DANE to a gathering of people within the DNSSEC community? Do you have an idea for a new tool or service? Have you recently implemented DNSSEC or DANE and want to share your story? The deadline is Monday, August 17, so please send your proposal soon! We are open to proposals on a wide range of topics... more

Internet Society’s Contribution to the WSIS+10 Written Consultation

Today we at the Internet Society submitted our contribution to the United Nations General Assembly's 10-year review of the World Summit on the Information Society (WSIS+10) that will take place in New York in December. The goal of this meeting is to set the agenda for the UN - and through that the agendas of nations around the world -- with regard to the future of the "Information Society". more

How to Move Cybersecurity Forward in a More Positive Way

In 2013 I wrote a blog Telecoms as a spying tool, in which I mentioned that those who use the internet to spy indiscriminately will have to face the reality that such activities will only start a cat-and-mouse game -- the technology will always be able to stay one step ahead of those who are using the internet for criminal purposes. Since that time some very significant developments have taken place that have confirmed our prediction. more

Topics

DNS

Sponsored byDNIB.com

Threat Intelligence

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days