Featured Blogs

Latest

Unregistered Gems: Identifying Brandable Domain Names Using Phonotactic Analysis

Conventional wisdom within the domain-sales industry states that the stock of unregistered domain names is 'running out,' with limited or no availability of short, desirable domain names across popular extensions (TLDs). This presents problems for would-be brand owners looking for a brand name (and accompanying suitable website presence) to utilize for newly-launched companies... more

How AI Is Boosting Domain Registrar Efficiency, Empowering Registries and Transforming User Experience

AI is bringing changes to the domain registration process by enhancing user experience, improving registrar operations, and empowering registries. In recent years, AI has entered the industry via the huge growth of new website builders. Today, new developments in the field offer an opportunity to align the interests of all stakeholders, from end user to registry. more

Decoding Internet Governance Stakeholders, Part 1: Technical Community

The "Decoding Internet Governance Stakeholders" series of articles invites the community to ponder what underlies the labels that define our interactions, roughly 20 years after the "Tunis Agenda for the Information Society" called for the "full involvement of governments, business entities, civil society and intergovernmental organizations," as well as to "make full use of the expertise of the academic, scientific and technical communities." more

Russian Internet Pioneer Sentenced to Two Years in Prison

Last month, Russian Internet pioneer Alexey Soldatov was sentenced to two years in a labor colony on charges of "abuse of power." Soldatov, the co-founder of Russia's first Internet service provider, Relcom, was convicted for his role as a co-founder and director of the Russian Institute for Development of Public Networks (RIPN). RIPN was founded in 1992 to support research and education networking. more

The Dos and Don’ts of DNS Management

The domain name system (DNS) is vital for businesses as it facilitates customer access to online services and resources. Strategic DNS management plays a pivotal role in cybersecurity, safeguarding against threat vectors and ensuring secure global connectivity across online channels including apps, email, websites, application programming interfaces (APIs) and more. more

Today’s CISOs Are Contending With Oft-Changing Disclosure Standards

When it comes to breach disclosures, today's chief information security officers (CISOs) are struggling with an especially turbulent regulatory environment. Security teams are understaffed, and systems are more extensive, making them harder to monitor and defend, while threats are becoming more sophisticated, more frequent, and more varied. It's at precisely this difficult juncture that regulations and enforcement are rapidly changing, leaving CISOs feeling like they are running up the down escalator. more

Will Starlink Harm the Ozone Layer?

There was a paper published in June in the peer-reviewed Geophysical Research Letters titled Potential Ozone Depletion from Satellite Demise During Atmospheric Reentry in the Era of Mega-Constellations. As can be deduced by the lengthy title, scientists have uncovered a new risk coming from the reentry of low-orbit satellites through the atmosphere. more

Setting the Record Straight - Myths vs. Facts about .com

Over the past several weeks, there has been significant discussion about Verisign and its management of the .com top-level domain (TLD) registry. Much of this discussion has been distorted by factual inaccuracies, a misunderstanding of core technical concepts, and misinterpretations regarding pricing, competition, and market dynamics in the domain name industry. more

Is 5G Faster than 4G?

Ookla recently tackled this question in one of its research articles. Ookla compared the time it takes to load pages for Facebook, Google, and YouTube on cellphones using 4G LTE networks versus 5G networks. Ookla thinks that page load speed is a great way to measure cellphone experience. The time needed to load a web page is directly impacted by latency, which measures the lag between the time a phone requests a website and that website responds. more

Human Rights and Standards Development Organizations

Do human rights come into the picture when technology and policy work are involved? If so, where? This is a question that has come up multiple times during the last dozen years, and occasionally even before, in Internet Governance discussions. These discussions have included debates on whether human rights were specifically applicable to protocol design or to the organizations developing protocol standards. more

The Role of Chronic Radio Interoperability Impediments in the Butler, PA Assassination Attempt

There are many inconvenient truths about radio spectrum sharing and transceiver interoperability that require full ventilation and resolution. Spectrum users want exclusive access and - news flash - they do not like to share! Campaign events, like the Trump Bulter, PA rally, require short notice, forced cooperation between and among federal, state, and local law enforcement officers, as well as a variety of other government agencies. more

Broadband Anywhere: The New Trend Bringing Connectivity to Campers and Remote Locations

A new broadband trend has quietly entered the market. Both Starlink and T-Mobile are advertising broadband that can be used practically anywhere and are aiming new products at campers, hikers, and others that go to remote locations. According to T-Mobile, this is a huge market, with 15 million households taking RV trips yearly and 59 million people camping. more

Can Cellphones Capture the Broadband Market?

Linda Hardesty wrote an interesting article in FierceNetwork that asks the question, "What if, in ten years, young people don't subscribe to fixed broadband at all?" Her story is based on a U.K. research group that predicts that within ten years, there will be a lot of young people who will never have subscribed to a landline broadband product. more

Harmonizing WHOIS With NIS2 Article 28 - the Rubber Is About to Meet the Road

ICANN must act now to harmonize its domain name registration data (commonly known as WHOIS) policies with Article 28 of the European Union's Network and Information Security (NIS2) directive, first to adhere to applicable laws as it fulfills its oversight responsibilities and, second, to keep its word to the community to preserve WHOIS to the fullest extent possible under law. more

Phishers Exploit the Cybercrime Supply Chain Despite the Availability of Effective Countermeasures

Interisle Consulting Group today released its fourth annual Phishing Landscape report investigating where and how cybercriminals acquire naming and hosting resources for phishing. Our study shows that cybercriminals evolved their tactics for obtaining attack resources, including sharply increasing their exploitation of subdomain and gateway providers. more

Topics

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Threat Intelligence

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days