Featured Blogs

Latest

The Role of Cloud Resource Provisioning in Web App CICD Pipelines

Thanks to wide adoption of the Infrastructure as Code (IaC) approach, programmatic provisioning of cloud resources is slowly transforming almost every aspect of computing, with administration of web apps having emerged as a key use case. With IaC, it's possible to streamline resource management tasks, shorten time-to-market, control costs, and scale at will. The adoption of continuous integration and continuous delivery (CICD) pipelines is already making a huge difference in web app deployment and cloud resource management. more

Want to Help Ensure the Internet Remains Open? Internet Society Seeks Nominations for 2025 Board of Trustees

Do you (or someone you know) believe that people everywhere should have access to affordable, reliable, and resilient Internet connectivity? Are you passionate about ensuring that people everywhere have an Internet experience that is safe, secure, and protects them online? Do you have leadership experience in business, government, philanthropy, and/or the nonprofit sector? more

Attacking DNS Abuse: The Next Amendments Needed

Abusive behavior that leverages the domain name system (DNS) continues to be a problem, with a reach that has been widely and credibly documented. There is little doubt that bad actors continue to use the DNS for nefarious and costly purposes. While the amendments made in 2024 to ICANN's Registry Agreement (RA) and Registrar Accreditation Agreement (RAA) were a step in the right direction, more advanced tools are needed to bring abuse rates down. more

How Dormant Domains Can Be Weaponized During Events Like the 2024 U.S. Election

As with any high-stakes event, elections have become a prime target for cybercriminals seeking to exploit public trust through impersonation, misinformation, and scams. CSC's comprehensive research about the 2024 U.S. Election reveals the alarming role of dormant domains, which have the potential to be exploited for launching cyber attacks against political campaigns, organizations, and constituents. more

DNS: The Proven, Eco-Friendly Alternative to Blockchain and NFTs

As the world races towards digital transformation, the technologies we choose will have a lasting impact on our planet. Blockchain, NFTs, and other crypto assets have garnered much attention for their ability to securely and immutably store records. However, the environmental cost of maintaining these technologies is often overlooked. The energy consumption required to sustain blockchains, particularly those using Proof of Work (PoW), is enormous... more

NIS2 Article 28 Guidance: A Positive Step Toward Reducing DNS Abuse Across Europe

The European Union (EU) has set a high bar by tackling domain name system (DNS) abuse head on via government regulation and seems to have successfully resisted attempts to water down DNS stewardship obligations. Recent guidance from a key European Commission cooperation group (the NIS Cooperation Group) handling sections of the Network and Information Security Directive (NIS2) intends for a robust implementation of Article 28, which will go a long way toward helping to mitigate some of the longstanding problems that persist in the DNS. more

UN’s Global Digital Compact: A Fork in the Road for Internet Governance?

As the United Nations' Global Digital Compact (GDC) approaches its expected adoption, a growing chorus of critics warns that it threatens the very foundations of multistakeholderism in Internet governance. While the GDC aims to foster global cooperation and advance shared objectives for digital transformation, it not only centralizes power within the UN but also sidelines the Internet Governance Forum (IGF) - a platform that has, for years, been instrumental in amplifying diverse voices, especially from marginalized communities and the private sector. more

Verisign and ICANN Renew Root Zone Maintainer Service Agreement

On October 20th, ICANN and Verisign renewed the agreement under which Verisign will continue to act as Root Zone Maintainer for the Domain Name System (DNS) for another 8-year term. The Root Zone sits atop the hierarchical architecture of the DNS and is essential to virtually all internet navigation, acting as the dynamic, cryptographically secure, global directory of all top-level domains that exist in the DNS. more

Why Satellite Cellular Won’t Replace Traditional Cell Networks Anytime Soon

There was a burst of recent press about cellular service provided from satellites. This was probably prompted by the two recent hurricanes that have disabled terrestrial cellular and broadband networks in the southeast. I've seen speculation and discussion on Reddit and other forums where people have been wondering if satellite is the future of cell service and if the ubiquitous giant cell towers will eventually become obsolete. more

Further Ideas in Mark Similarity Measurement

In the final three articles in my series looking at algorithms for measuring the similarity of marks, I extend the ideas to provide a more sophisticated and adaptable framework. Article 4 introduces a similarity score based on color distance in RGB space, offering a quantitative approach to trademark similarity. Article 5 refines word mark similarity by using the International Phonetic Alphabet to improve phonetic analysis. The final article presents a method for sorting colors by dominant shade, aiding in trademark review and potential guidelines for color mark protection. more

Broadband Labels are Here

On October 10, all ISPs in the United States were supposed to have implemented and posted broadband labels. The labels were required as part of the Infrastructure Investment and Jobs Act. Large ISPs had to post labels six months ago, and now the requirement is for all ISPs. I looked at the ISPs in a few counties I'm very familiar with, and I found a few ISPs in each county that have not posted labels that I can find on their website. more

Decoding Internet Governance Stakeholders, Part 2: Private Sector

The "Decoding Internet Governance Stakeholders" series of articles invites the community to ponder what underlies the labels that define our interactions, roughly 20 years after the "Tunis Agenda for the Information Society" called for the "full involvement of governments, business entities, civil society and intergovernmental organizations", as well as to "make full use of the expertise of the academic, scientific and technical communities". more

Further Developing a Word Mark Similarity Measurement Framework

Expanding on a framework for quantifying word mark similarity by examining algorithms and proposing enhancements. This article assesses consistency with UK trademark case decisions and a search tool, explores subsequence analysis for similarity, and suggests using IPA phonetics to measure aural likeness. The objective framework could improve consistency in trademark assessments, despite the inherent subjectivity of legal tests. more

Supreme Court Delivers One-Two Punch to Agency Power

At the end of its 2024 term, the Supreme Court made two landmark rulings that limit federal agencies' regulatory powers. Loper Bright Enterprises v. Raimondo curtails their ability to create new regulations, while SEC v. Jarkesy reduces their capacity to enforce existing laws. These decisions significantly weaken agencies like the FCC in regulating sectors of the national economy, marking a substantial shift in administrative authority. more

What the Global Digital Compact Taught Us About Future Internet Governance Debates

On September 22, the United Nations General Assembly adopted the Global Digital Compact (GDC), marking one of the most significant intergovernmental agreements on digital issues in the past two decades. Appended to the Pact for the Future, the GDC is a non-binding agreement that outlines a global governance framework for a wide range of digital issues, including internet governance and the Internet Governance Forum (IGF). more

Topics

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days