Featured Blogs

Latest

Standing Up for a Safe Internet

Back when I started working in this industry in 2001, ICANN was small, the industry was tight, and things moved slowly as interest groups negotiated a balance amongst the impacts of change. Change often meant added overhead and, at the very least, a one-time cost effort to implement on the commercial side. Registries and registrars preferred to be hands-off when it came to how their domains were being used. But e-crime became big business during the 2000s. more

Singular and Plural TLDs: A Rather Strange Decision

ICANN stated recently that it will allow similar (i.e. singular and plural) versions of the same string to co-exist for new Top-Level Domains (TLDs). This surprising decision immediately begs the question: "Will ICANN give holders of a string first refusal on the (singular or plural) version that they do not already hold during the next round of applications where only one version (singular or plural) of a string has been awarded?" more

No Surprise: Verisign’s Shift on New gTLDs

Five years after ICANN approved the new gTLD policy in Paris, two years after it approved the implementation plan in Singapore, and a year after the application window closed and some concrete steps were taken toward delegation of new gTLDs, a series of scary-sounding "what if" scenarios have mysteriously taken over discussions at ICANN. From colliding names and failing life support systems to mass confusion and technological outages, the profusion of horror stories has rivaled the hype for the Y2K conversion, with about as much basis in fact. more

The Technical Impact of New gTLDs: Are We Pushing on Regardless?

Have some security aspects been overlooked in the rush to conclude the new gTLD program and "give birth to the baby before it starts to get really sick" as ICANN CEO Fadi ChehadĂ© put it at a briefing jointly organised by ICANN and the European Commission a few days ago? Ever since 2008 when the ICANN Board approved the GNSO-evolved policy that became the new gTLD program, it has been reworked so much that it's difficult to imagine any stone has been left unturned. Yet a recent letter threatens to open up a new can of worms. more

GAC, Inside Out: When GAC Members Abuse ICANN Procedures…

There is no doubt that the new gTLD program has been the most encouraging revolutionary program in the history of internet. As everybody expected, there have been lots of positive and negative insights about this program in recent years and during the process of development of the program, pushing ICANN to be very conservative in its program in order to satisfy all internet stakeholders. more

Google’s .App TLD Application Under Fire

I've written about "closed generic" new TLD applications several times over the last year. I'm opposed to them, as I've said in the past and continue to say today. However I've generally been supportive of "restricted" TLDs. The Association for Competitive Technology (ACT) has serious concerns about Google's application for .app and want ICANN's board of directors to treat as a "closed generic". more

Here’s Looking at You…

Much has been said in recent weeks about various forms of cyber spying. The United States has accused the Chinese of cyber espionage and stealing industrial secrets. A former contractor to the United States' NSA, Edward Snowden, has accused various US intelligence agencies of systematic examination of activity on various popular social network services... These days cloud services may be all the vogue, but there is also an emerging understanding that once your data heads into one of these clouds, then it's no longer necessarily entirely your data; it may have become somebody else's data too... more

ICANN Board Resolutions May Enable New gTLDs to Potentially Launch in Fall

In an attempt to appease the Governmental Advisory Committee, ICANN's New gTLD Program Committee directed ICANN staff to amend the Registry Agreement so that all New gTLD Registries will be required to include a provision in its Registry-Registrar Agreement that requires Registrars to include in their Registration Agreement a provision prohibiting Registered Name Holders from distributing malware, abusively operating botnets, phishing, piracy, trademark or copyright infringement, fraudulent or deceptive practices, counterfeiting or otherwise engaging in activity contrary to applicable law, and providing (consistent with applicable law and any related procedures) consequences for such activities including suspension of the domain name. more

Rebooting Whois

As some readers probably know, I spend quite a bit of my time working on Internet policy related matters. Some of it may appear incredibly boring, but it matters. (If you really want me to explain why it matters I'd be happy to do so!) Since earlier this year I've been part of a small team of people drawn from the four corners of the globe and asked to re-examine "whois". more

Urgent Need to Revisit Internet Governance (WCIT-12)

Developments over the past few months - and especially the revelations about the spying work of the NSA on friendly governments and their people and businesses - show how important it is to try and establish some high-level strategies relating to managing the governance of the internet. While companies like Google have been lobbying hard against WCIT-12 - basically because they are opposed to any government interference in the internet - the reality is that, clearly without their knowledge, their own American government through the NSA is already directly interfering in their network. more

Google Books Case Part 4,523: Decide Fair Use First

The endless lawsuit by the Authors Guild (which purports to represent authors, no longer including me), against Google moved another small step toward completion today. The Guild is just sure that Google's book scanning project means that end of civilization as we, or at least they, know it. Their arguments run from the somewhat plausible, that the scans are in violation of copyright, to the just plain goofy, that the scan data is so amazingly valuable yet vulnerable that Google must destroy it before someone steals it. more

FCC Change of Chairman: Opportunities to Advance Telecoms in America

It is always the case that change brings with it new opportunities, and the change in the FCC chair will be no exception to this rule. But we have learned since President Obama came to power that we should not have too high an expectation of such a change. In my discussions with the US Administration, the White House and the FCC I have never come across any major disagreement about my views on the future of telecommunications. more

Name Collisions, Why Every Enterprise Should Care (Part 3 of 5)

Do you recall when you were a kid and you experienced for the first time an unnatural event where some other kid "stole" your name and their parents were now calling their child by your name, causing much confusion for all on the playground? And how this all made things even more complicated - or at least unnecessarily complex when you and that kid shared a classroom and teacher, or street, or coach and team, and just perhaps that kid even had the same surname as you, amplifying the issue! What you were experiencing was a naming collision (in meatspace). more

What Smaller Institutions Can Learn from DDoS Attacks on Big Banks

Since last fall, several waves of distributed denial of service (DDoS) attacks have targeted major players in the U.S. banking industry. JPMorgan Chase, Wells Fargo and PNC were among the first to sustain intermittent damage. Eventually, the top 50 institutions found themselves in the crosshairs... In the months to come, security experts would praise the banks' collective response, from heightened DDoS protection to candid customer communications.. these larger institutions have learned some painful lessons that smaller firms might heed as they seek to minimize risks. more

The Internet Is Designed for Surveillance

The current implementation of the Internet is hierarchical in that we get IP addresses from providers and then use a DNS that is rooted. We go even further in requiring that we conform to conditions on our intent (AKA our use) of connectivity in order to get a temporary lease on something so fundamental as our identity in the guise of a DNS name. We go further by accepting the idea that we communicate within pipes owned by service providers who can dictate terms in order to extract a rent. more

Topics

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days