Featured Blogs

Latest

Out of .Africa - Process Failures Don’t Change the Facts

Posted here on behalf of DotConnectAfrica Trust as rejoinder and reply to Andrew Mark's recent article... In his article, Mr. Mark tried to re-frame the ongoing discussions and commentary about DCA Trust's recent IRP victory against ICANN as one about "requisite support for geographic string" to assist him reach the biased conclusion that ZACR's bid has the required support to run .Africa whilst DCA Trust's bid does not. more

Navigating the .brand Delegation Process

Today marks a major milestone for .brand Top-Level Domain applicants, as we pass the deadline set by ICANN for them to sign their Registry Agreement (RA). For those who have knuckled down over the last few weeks and months to meet this deadline, congratulations -- for many, this was no mean feat and the effort should be acknowledged. more

5th ITAC OECD Newsletter: Internet Governance, WSIS+10, IoT, Cybersecurity, Trust, Standards…

Today the Internet Technical Advisory Committee (ITAC) to the OECD published the fifth edition of its newsletter. The ITAC was created in 2009 following the OECD's Seoul Ministerial with the objective to provide Internet technical and policy expertise to the work of the OECD on Internet-related issues. This informal group is coordinated by the Internet Society and currently counts 28 members active in domains such as open Internet/Web standards development, interconnection, IP addressing, security or privacy. more

Should You Whitelist Your Vulnerability Scanning Service Provider?

Unlike consultant-led penetration testing, periodic or continual vulnerability scanning programs have to operate harmoniously with a corporation's perimeter defenses. Firewalls, intrusion prevention systems, web proxies, dynamic malware analysis systems, and even content delivery networks, are deployed to protect against the continuous probes and exploit attempts of remote adversaries -- yet they need to ignore (or at least not escalate) similar probes and tests being launched by the managed security service providers an organization has employed to identify and alert upon any new vulnerabilities within the infrastructure or applications that are to be protected. more

Independent Show 2015: Out-of-the-Box Lessons in the Digital Age

This year's Independent Show summer conference was held in Boston, a place where the accents are strong and you hear great quotes like... If I had to sum up this year's conference with one phrase, it would have to be: out-of-the-box thinking. The keynote speech was given by Professor Bharat Anand of the Harvard School of Business, whose expertise is in the areas of digital strategy, corporate strategy, and media strategy -- in other words, digital marketing. The title was "Lessons from the Digital Transformation of Media". more

A New Boom to Come? Re-Evaluating the Success of the New TLD Program

I think it's fair to say that quite a few people -- both within the domain name industry and beyond -- have an opinion on whether the new TLD program is succeeding or struggling. But are things really all that bad? Are we forecasting doom before it has really had a chance to run? Crunching the numbers... Let's consider the (relatively short) history to this point and take a look at some statistics. more

The Senate Should Take the DOTCOM Act Off Cruz Control

Recently we speculated on the question "Will 2016 Politics Trump Bipartisan Support for the MSM and DOTCOM Act?" That article discussed the possibility that the Obama Administration's decision to relinquish ICANN stewardship via the periodic re-awarding of the IANA functions contract might arise in the ongoing U.S. Presidential sweepstakes, most likely from a Republican entrenched in the far right wing of that Party. We also discussed whether its introduction might erode the currently broad and bipartisan Congressional acceptance of the transition... more

Global Paradigms We Relied Upon Were Destroyed Overnight - How Prepared Are You for New Realities?

Unprecedented new Political and Cyber Security Threats are happening at a scale that has never been witnessed before. These threats are large and malicious enough to take down nuclear programs, render oil refineries inoperable, and take billion-dollar websites offline (not to mention smaller ones). Recent events confirm that NO ONE IS IMMUNE. Despite the obvious warning signs, Internet business stakeholders the world over continue to act as if nothing has changed, and seem unaware that global paradigms have undergone a seismic shift almost overnight. more

Dot SUCKS: The Ultimate Vanity Domain

When last we wrote, trademark lawyers had written an outraged letter to ICANN about the $2500 price to preregister trademark.sucks names, and ICANN, reliably panicking in the face of legal threats, wrote to the US Federal Trade Commission and Canadian Office of Consumer Affairs saying please tell us that's illegal so we can shut down this registry with whom we just signed a long-term contract. (The mysterious $1 surcharge turned out to be a weak attempt by ICANN to collect debts that affiliates of registry owner Momentous defaulted on long ago.) more

Out of .Africa - Process Failures Don’t Change the Facts

I've heard a lot of discussion of the .africa controversy of late -- from conspiracy theories to questions about staff competence to concerns about the role of the GAC. And it's hard not to find faults galore in the way this process and the IRP reporting has played out. But before we get too lost in the weeds of procedure or the future of ICANN, lets not lose track of what this debate was first and still is fundamentally about: a string. more

ICANN 53: Accountability, Brand Policy & New Round of New gTLDs

In June, MarkMonitor joined our colleagues once again at the Internet Corporation of Assigned Names and Numbers (ICANN) 53rd public meeting in Buenos Aires, Argentina. Several high-profile and contentious issues were on the agenda, many of which have significant impact on the interests of intellectual property and brand owners. Among these are the ongoing ICANN Accountability issues and the impending departure of ICANN CEO Fadi ChehadĂ©; registrant information (Whois) transparency, accuracy and accessibility; and the timing of the next round of new gTLD applications/delegation. more

Digital Economy + Sharing Economy = Networked Economy

A great deal of discussion is taking place about topics such as the digital economy, sharing economy and networked economy. Obviously these are concepts rather than being well-defined, but they are being used by the various players in the market to argue for or against certain developments. For example, in some of the broadband debates around the world, the digital economy is the key reason why national broadband infrastructure gets developed. more

New Trend: Vanity IPv6 Addresses

It's like a vanity license plate, but for your IP address. Previously under IPv4 DNS registration, users were limited to only using numbers. However, with the height of IPv6 underway users are getting creative with their newfound use of characters. Although you can only use characters A-F, it only takes a little creativity to find ways around this. more

Are Apps a Passing Phase?

At NetHui last week one of the most interesting sessions was "Is there an app for that?". The issue was that while apps can be easy to use, they are little walled gardens within an app store which is another level of walled garden. The Apple app store or Google play makes it easy to find apps, but it also means that you're limited to apps that your environment's corporate overlords approve and in Apple's case, charge to include. more

What Does the July 29 Deadline Mean for .brand TLDs?

This is the first post in a series from Corey Grant, Senior Industry Consultant at ARI Registry Services, on what .brand TLDs need to do to get started and make the most of their TLDs... If you are a .brand Top Level Domain (TLD) and have a Registry Agreement from ICANN which you have not yet signed, you need to sign it by July 29, 2015. You're not alone; there are many others in the same boat -- all staring at their Registry Agreement trying to figure out what to do next. more

Topics

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days