Recently the relevancy of Spamhaus and whether it is still necessary has been raised in various discussions and in particular among marketers. I think this is an interesting question for a lot of reasons. One is because there's such a broad range of opinions about Spamhaus and almost none of them are ambivalent. Another is because so many people don't really know what Spamhaus does, other than publish the SBL and ROKSO. more
I have had the question recently with several new gTLD applicants. I think this is a good subject for applicants with the intention to sell domain names AND who are alone to apply for their string. A Pioneer program allows to: Find good partners to developp a TLD; once the program is signed, it is an insurance they will have a good use of the requested domain name... more
The quest for new top-level domains took an important step last spring with 1,930 applications to ICANN. 755 of these applications, from 145 different parties, are under contention. ICANN has encouraged these applicants to resolve the contention among them, and has established a last-resort auction in the event agreements among applicants cannot be reached. Here I describe a private auction model, the Applicant Auction, which is an efficient, fair and transparent approach to resolve contentions. more
It is certainly proving to be a long and winding road for the 1923 gTLD applications submitted to ICANN. Glitches, delays and now a very high percentage of applications will very shortly be receiving clarifying (financial) questions on 26 November. Currently a very high percentage of applicants have not scored the required 8 points to pass financial evaluation. This is the next huge challenge for applicants. more
Recent events relating to the network plans of AT&T and Verizon are extraordinary: it appears that the commercial and lobbying clout of two major telcos is determining the telecom services which their customers can receive, the technology they will receive them with, and whether they will receive them at all. Already a large number of states have agreed to dismantle Carrier of Last Resort (COLR) obligations on them, while the FCC itself is being advised to change the rules to suit the business interest of the telcos. more
If the timeline for turn-around of clarifying questions (CQs) remains two-weeks, the long pole in your CQ tent is likely to be revising your Q50 letter of credit or escrow agreement to meet the ICANN requirements. Based upon ICANN comments, it appears that many applicants are having trouble meeting the specific letter of credit (LOC) or escrow agreement language. To remedy this ICANN should consider publishing what it considers acceptable language for an LOC or escrow agreement. more
When Barack Obama succeeded George W Bush and became America's 44th president, it seemed he could do no wrong. But this was arguably more a consequence of the perceived inadequacies of his predecessor than a realistic reflection on his own abilities. A fact highlighted by Obama being awarded the Nobel peace prize a mere nine months after taking office, before he'd had any real chance of having an impact on America or the world. When Fadi Chehadé was formally introduced as ICANN's next CEO, at the organisation's 44th international meeting in Prague last June, there was an undeniable Obama effect... more
The possibility of unauthorized access to EPA information raises an array of concerns since EPA-held data includes various types of Confidential Business Information, scientific research data, environmental databases, agency plans for responding to "incidents of national significance" and other security-related matters, and environmental monitoring data used in regulatory enforcement actions. more
The Copyright Alert System, the result of a deal between big content and big ISPs, is a graduated response program - popularly known as the six strikes - that escalates from nastygrams, to copyright school, to Internet throttling. Just like SOPA/PIPA, enforcement targets will be arbitrarily selected by the content owners, but unlike SOPA/PIPA there will be no appeal via the courts - only to an arbitration firm hired by the program. more
While the internet has brought about the transformation of whole industry sectors and generated thousands of business models, as well as changing social behaviour, it is at the same time creating its own giants and dominant players. Does this mean that while certain vested interests are demolished, and others transform themselves into smaller sectors and organisations, new conglomerates will surface? Only time will tell more
In February 2012, Neustar surveyed IT professionals across North America to better understand their DDoS experiences. Most were network services managers, senior systems engineers, systems administrators and directors of IT operations. In all, 1,000 people from 26 different industries shared responses about attacks, defenses, ongoing concerns, risks and financial losses. more
In the first part of this series on ICANN's impending Clarifying Questions period, I outlined what you can expect in terms of question structure. Here I would like to outline how the points work and provide some advice on how to answer questions for best success. more
One of the most important debates in the realm of Internet governance pertains to when, how and how much voluntary action registrars can and should take to prevent the use of their registration platforms in furtherance of criminal activity. In the Internet pharmacy world, the trend over the past four years has been unmistakable: A growing number of registrars worldwide, large and small, recognize the value of prohibiting the use of their registration services... more
Starting in mid-September, one of the largest and most sophisticated DDoS attacks ever targeted the titans of American banking. Initially, victims included Bank of America, JPMorgan Chase, Wells Fargo, PNC Bank, and U.S. Bancorp. In the weeks to come, others would also feel the pain. Websites crashed, customers were unable to make transactions and IT professionals and PR gurus went into panic mode. Leon Panetta, U.S. Secretary of Defense, said the attacks foreshadowed a "Cyber Pearl Harbor." more
If there's one simple - high impact - thing you could do to quickly check whether your network has been taken over by a criminal entity, or uncover whether some nefarious character is rummaging through your organizations most sensitive intellectual property out of business hours, what would it be? In a nutshell, I'd look to my DNS logs. It's staggering to me how few security teams have gotten wise to regularly interrogating the logs from their recursive DNS servers. more
Sponsored byCSC
Sponsored byVerisign
Sponsored byRadix
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byIPv4.Global