Featured Blogs

Latest

A Cynic’s View of 2015 Security Predictions - Part 4

Lastly, and certainly not the least, part four of my security predictions takes a deeper dive into mobile threats and what companies and consumer can do to protect themselves. If there is one particular threat category that has been repeatedly singled out for the next great wave of threats, it has to be the mobile platform -- in particular, smartphones... The general consensus of prediction was that we're (once again) on the cusp of a pandemic threat. more

Addressing 2014 - And Then There Were 2!

Time for another annual roundup from the world of IP addresses. What happened in 2014 and what is likely to happen in 2015? This is an update to the reports prepared at the same time in previous years. So lets see what has changed in the past 12 months in addressing the Internet and look at how IP address allocation information can inform us of the changing nature of the network itself. more

NFL Super Bowl to Stream Live Today for Free - Who Will Be Measuring Statistics?

Today NBC is streaming the NFL's Super Bowl live for free through mobile apps as well as their NBC Sports website. Given the number of "cord-cutters" and mobile users out there, I suspect there should be a good number of people watching the event through the live streams today. more

IPv6 Security Myth #3: No IPv6 NAT Means Less Security

We're back again with part 3 in this 10 part series that seeks to bust 10 of the most common IPv6 security myths. Today's myth is a doozy. This is the only myth on our list that I have seen folks raise their voices over. For whatever reason, Network Address Translation (NAT) seems to be a polarizing force in the networking world. It also plays a role in differentiating IPv4 from IPv6. more

A Cynic’s View of 2015 Security Predictions - Part 3

A number of security predictions have been doing the rounds over the last few weeks, so I decided to put pen to paper and write a list of my own. However, I have a quite a few predictions so I have listed them over several blog posts. After all, I didn't want to bombard you with too much information in one go! Part three examines the threats associated with data breaches. more

The IETF’s *Other* Diversity Challenge: An Update

Last June I wrote an article titled "The IETF's Other Diversity Challenge" where I discussed the positive steps the Internet Engineering Task Force (IETF) is taking to increase the diversity of its participants and raised a potentially overlooked demographic: Network Operators. That essay was a problem statement of sorts, and I was long ago taught that you should only raise problems that you have a solution for, or are at least willing to help solve. more

The Google Factor in the Obama Broadband Speech

Every time Google becomes involved in telecommunications it gets international media coverage; and every single time the same question is raised -- why does Google become involved in telecoms infrastructure, plus the underlying issue of it becoming a telecoms operator. This time the question is -- why does Google want to become involved in mobile telecoms and how is it going to compete with the other operators? more

Am I Safer Within an Organization or by Myself?

An Internet Bill of Rights may or may not be a good idea. The point here is that, besides highly commendable topics such as net neutrality and privacy, some of them seem to mandate cybersecurity. Approved in Brazil last May, the Marco Civil includes the principle of preservation of stability, security and functionality of the network, via technical measures consistent with international standards.  more

NTIA Says Cromnibus Bars IANA Transition During Current Contract Term

The Congressional Internet Caucus held its 15th annual State of the Net conference today at The Newseum in Washington, DC. This is traditionally a start the new year networking and information update day for the capital's technology policy set. Immediately following the lunch break, at a session titled "Internet Functions in Transition: Is the US and the World Ready?", NTIA head Lawrence Strickling provided the first official Obama Administration reaction... more

U.S. Cable Industry Says to FCC That Consumers Don’t Need 25 Mbps Speed

Apparently, we consumers in the USA don't need to have broadband speeds of 25 Mbps or higher. And we certainly don't need upload speeds greater than 3 Mbps! At least, that's according to comments filed to the US Federal Communications Committee (FCC) by the National Cable & Telecommunications Assocation (NCTA) in response to the FCC's proposal to raise the definition of "broadband" from 4 Mbps downstream and 1 Mbps upstream to 25 Mbps down and 3 Mbps up. more

Bringing Multistakholderism Home, .US and the Stakeholder Council

2014 will be remembered as the year of the "multistakeholder model" on the Internet. NTIA demonstrated its commitment to bottom-up, multistakeholder Internet governance by committing to complete the transfer of responsibility for various technical functions -- known as the IANA Functions -- to the multistakeholder community. NTIA called on ICANN to convene the community to develop a transition plan to accomplish this goal. more

Occupy IG - Internet Social Forum to Torpedo NETmundial Initiative and Disrupt Davos Discussions

As we have previously observed, the efforts undertaken by ICANN, the World Economic Forum (WEF), and CGI.BR to launch a NETmundial Initiative (NMI) to follow up on last spring's NETmundial meeting in Sao Paulo has encountered heavy skepticism and substantial resistance from the major civil society and technical groups from which endorsement and participation was sought. more

ICANN: Our Top 3 Policy Priorities for 2015

2014 was a big year for us and for our clients. The new gTLD program forced us to rethink, reprioritize and implement new and different strategies to protect our brands online. The uncertainty largely behind us, and with more information at our fingertips about just how well (or not) brands are faring in the new environment, it's time to look forward to what we can do in 2015 to fix what's broken, throw away what's useless, fight for what's important... more

A Cynic’s View of 2015 Security Predictions - Part 2

Every year those in the security industry are bombarded with various cyber security predictions. There's the good, the bad and the ugly. Some predictions are fairly ground breaking, while others are just recycled from previous years -- that's allowed of course if the threats still stand. In part one of my predictions I looked at the malware threats, so let's take a look at big data and the cloud for part two. more

A Case for Looking Before Leaping: The IANA Stewardship Proposal

In my comments on the draft Cross-Community Working Group (CWG) on Naming Related Functions proposal for the IANA transition, I expressed my overall support, albeit somewhat reserved, for the proposal... but with the ICG's deadline of January 15 having come and gone, and the informal deadline of January 31 looming for the revised proposal from the Names community to be submitted, I'd like to shed some light on what I believe the role and reasoning for some of the mechanisms identified by the CWG, specifically the Contract Co., to be. more

Topics

New TLDs

Sponsored byRadix

Threat Intelligence

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days