Hundreds of individuals from across the Internet community have spent countless hours over the last several months crafting plans for the transition of the stewardship of the IANA functions from NTIA to the global multistakeholder community. The fruits of that labor have become highly evident within the past weeks, as two out of three components of the transition plan obtained the consensus of their communities while the third continued its intensive progress. more
Your company can't ignore cloud computing: Some kind of distributed-access model is now necessary to tap global markets, manage big data and get access to best-in-class software. But with increased cloud adoption comes the issue of management, since it's no longer enough to simply spin up a cloud and hope for the best. Here are five of the top cloud management trends to watch this year -- and the risks of opting out. more
Cyber security was a hot topic in 2014. It seemed not a week went by without details of a high profile data breach hitting the headlines. To recap, the Sony breach was one of the most notable, as was the Home Depot hack, while details of widespread security vulnerabilities such as Heartbleed, Shellshock and Poodle were also revealed. But what will 2015 bring? Will it be more of the same, or have cyber criminals got some new tricks up their sleeves? more
Now that IPv6 is being actively deployed around the world, security is more and more a growing concern. Unfortunately, there are still a large number of myths that plague the IPv6 security world. These are things that people state as fact but simply aren't true. While traveling the world, talking to the people who've already deployed IPv6, I've identified what I believe are the ten most common IPv6 security myths. more
As I read through multiple postings covering the proposed Computer Fraud and Misuse Act, such as the ever-insightful writing of Rob Graham in his Obama's War on Hackers or the EFF's analysis, and the deluge of Facebook discussion threads where dozens of my security-minded friends shriek at the damage passing such an act would bring to our industry, I can't but help myself think that surely it's an early April Fools joke. more
The internet has become almost part of our daily involvement and reality is that it affects every facet of our modern lives. We are increasingly becoming dependent on the Internet, for which reason its availability, functionality, safety, stability and security are now of great and continuing concern to all of us and most importantly to US Congress, who so far has maintained stewardship over these key functions. more
You might expect that the IT department or security team knows who's sending email using your company's domains. But for a variety of reasons these groups are often unaware of many legitimate senders -- not to mention all the bad actors. Fortunately you can get a more complete view by using DMARC's reporting features. How does it happen? Product teams managing a new product launch or customer survey hire marketing consultants and Email Service Providers (ESP)... more
New gTLDs can be an efficient way to immediately propel a registrant's online relevance and profitability. Registrants are the companies, organizations and individuals who seek to better utilize the Internet to reach their goals. Marketing Professionals acting on their behalf should understand that protection mechanisms for new gTLDs have been created by ICANN. New gTLDs are powerful and inexpensive marketing tools that have improved measures of online stability and security... more
The White House has announced a new proposal to fix cybersecurity. Unfortunately, the positive effects will be minor at best; the real issue is not addressed. This is a serious missed opportunity by the Obama adminstration; it will expend a lot of political capital, to no real effect... The proposals focus on two things: improvements to the Computer Fraud and Abuse Act and provisions intended to encourage information sharing. At most, these will help at the margins; they'll do little to fix the underlying problems. more
I have often remarked that any fool can run a DNS-Based Blacklist (DNSBL) and many fools do so. Since approximately nobody uses the incompetently run black lists, they don't matter. Unfortunately, using a DNSBL requires equally little expertise, which becomes a problem when an operator wants to shut down a list. When someone sets up a mail server (which we'll call an MTA for Mail Transfer Agent), one of the tasks is to configure the anti-spam features, which invariably involves using DNSBLs. more
I've got enormous respect and admiration for the passionate individuals who are still championing .brands for their organisations in the new Top-Level Domain (TLD) program. I have the pleasure of assisting quite a few of these on a daily basis and I'm sure their experiences aren't isolated with other applicants across the globe. Put yourself in their shoes. Delays, some stupid process called Digital Archery, GAC Advice, names collisions and negative media... more
With the arrival of hundreds of new generic top-level domains (gTLDs), many marketers are excited that they can now get a web address that best describes their business or brand. For instance, a company in the organic business can now get a web address on .ORGANIC, or a brand that's all about passion and excitement can now get on .RED, etc. At the same time, many are also asking some important SEO related questions. more
It's hard to believe that another year has come and gone and that I'm now publishing my 5th Annual Domain Name Year in Review. It's sort of fun to look back 5 years ago to see how much things have changed, especially as focus has shifted to issues related to the launch and use of new gTLDs. Of course, much has stayed the same too. Concerns related to domain name security and domain portfolio management are still important. more
"Money is like muck, not good except it be spread", according to English philosopher Francis Bacon. In these times when everyone is busy with the big questions surrounding the IANA transition and ICANN accountability, I thought we could quickly solve some simple questions. One of them is: What should ICANN do with all that money? What money, you might ask? more
This year I didn't even get a good picture of our famous Christmas goat here in the city of Gavle Sweden. The Christmas goat this year survived Christmas but were suddenly on the 28th of December dismounted. The reason for the poor goat's early leave from its own little park downtown Gavle is that it is now the year of the goat in China, and the city of Gavle has a sister-town in China -- Zhuhai. more
Sponsored byVerisign
Sponsored byCSC
Sponsored byIPv4.Global
Sponsored byRadix
Sponsored byWhoisXML API
Sponsored byDNIB.com
Sponsored byVerisign