Featured Blogs

Latest

Persistent Threat Detection on a Budget

If there's one simple - high impact - thing you could do to quickly check whether your network has been taken over by a criminal entity, or uncover whether some nefarious character is rummaging through your organizations most sensitive intellectual property out of business hours, what would it be? In a nutshell, I'd look to my DNS logs. It's staggering to me how few security teams have gotten wise to regularly interrogating the logs from their recursive DNS servers. more

Brussels Mandate: Community-Developed Tmch Gains Ascendancy

ICANN has tentatively agreed to proceed with the community-developed Trademark Clearinghouse (TMCH) model following two days of discussions at a specially organised informal meeting in Brussels last week. I believe this is an important breakthrough for the intellectual property, registry and registrar communities as it provides the best harmony between technical implementation and best practice trademark protection policy. more

ICANN Clarifying Questions - How Are They Structured? (Part 1 of 3)

Several weeks ago ICANN issued clarifying questions to approximately 50 of the 1,930 new gTLD applications submitted last spring. Some of our clients were selected for this pilot effort and we've had the opportunity to review seven sets of clarifying questions totaling approximately 30 individual questions. ICANN has indicated that in late November they will begin issuing Clarifying Questions to the balance of applicants. more

Watch The IGF 2012 Live From Baku

The Seventh Annual Internet Governance Forum (IGF) is underway now in Baku, Azerbaijan, from November 6-9, 2012. Very appropriately, it is possible to listen in to any of the sessions remotely across the Internet. Details can be found here... more

Internet Connectivity: Toward a Sustainable Funding Model

I'm writing this in the midst of policy discussions between the Internet world (as embodied in ISOC) and the Telecommunications industry (ITU). The Internet and Telecommunications are very different concepts. The Internet allows us to focus on the task at hand. That's why it is so exciting. Historically telecommunication assumed value was created inside the network and this creates conflict with creating value outside the network. more

Telcos Cannot Wind Back the Clock

The proposals by the European and Arab telcos that are being considered at the World Conference on International Telecommunications (WCIT) conference in Dubai later this year are most certainly facing defeat. This is not because the USA believes that the international telecommunications regulations (ITR) cannot be discussed by the ITU. America has a rather strange set of national regulations in which they have combined internet infrastructure and content -- and as such they claim that this no longer has anything to do with telecommunications. more

Lessons from Sandy: Building Networks and Cyber-Infrastructure to Survive Climate Change

Hurricane Sandy has been a badly needed wake up call for the Internet community as to the threat of climate change. Although most people have forgotten, Sandy is the second hurricane to hit New York in as many years with Irene last August and a third tropical depression headed to New York at the time of this writing. Two, supposedly once in a hundred year storms, within such a short time frame should even make the most die-hard denialist that something's afoot. more

Attacking the Multi-Stakeholder Model

"If at first you don't succeed, try and try again." A famous saying, that some within the ICANN world seem to think actually means: "if at first you don't get what you want, try and try again." The basic premise of the ICANN system is simple and fair: get all parties to work together, give everyone an equal voice, and act on whatever consensus emerges. ICANN insiders have coined this the "multi-stakeholder, bottom-up, policy development process". more

IETF 85 Begins Next Week In Atlanta - Here Is How To Follow Along

The 85th meeting of the Internet Engineering Task Force (IETF) begins next week in Atlanta, Georgia, USA. Over 1000 engineers, maybe as many as 1400 or more, from all around the world will gather in various working groups to discuss and debate issues relating to the open standards that define the Internet's infrastructure. more

Names, Numbers and Beyond…

Couple of weeks ago I started a new initiative called "Names, Numbers and Beyond". I started this as I genuinely think we are facing big issues due to the uncontrolled and non-standard growth of the IP and Name space used today and tomorrow. To keep in control and make everything manageable, parcelling out IP address space and the use of tight naming standards/policies is necessary to make networks work better and make them achievable. more

NEW CEO, Trademark Clearinghouse, URS and RAA Take Center Stage at ICANN 45 in Toronto

At his first meeting as CEO of ICANN, Fadi Chehade showed up ready to work AND to listen. ICANN's new CEO described his objectives for the organization which included 1) affirmation of purpose, 2) operational excellence, 3) internationalization, and 4) evolution of the multi-stakeholder model on which ICANN is built. He also described significant organizational changes to ICANN leadership and staff... more

The Hybrid Cloud Impact on IPv6 Adaptation

Over the last couple of months, the enterprise computing space seems to have started a shift from private cloud paradigm into the hybrid cloud model. That makes sense, because the hybrid cloud allows companies to forgo the capital and the operating expenses associated with private clouds, in exchange for a pay-as-you-go model where you can just sit back and consume the business applications. more

Is The Term “Cyberwarfare” Overstating the Case?

At the Virus Bulletin conference last month, Andrew Lee from ESET gave a talk entitled "Cyberwar: Reality or Weapon of Mass Distraction?" In it, Lee talks about how the term "cyberwar" is thrown around a lot these days. However, he disagreed with the use of the term because it uses inflationary language and overstates the case; today's "cyberwar" is not the same as a conventional ware. more

The Great ITU Internet Heist

There was a meeting in Geneva a few weeks ago dealing with Internet names and addresses. Known as the Second Informal Expert Group Meeting of the Fifth World Telecommunication / Information and Communication Technologies Policy Forum, it was yet another of the endless blathering bodies on this subject that have met for the past fourteen years. more

The “ICANN Africa Strategy” Is Not the Same as the ‘African Agenda’

The ICANN-45 International meeting of the ICANN Global Community in Toronto, Canada provided an opportunity for the unveiling of the initial draft of the ICANN Africa Strategy, an episode that will always be remembered as a landmark moment which signaled the official commencement of ICANN's new approach to Africa. Indeed, a new chapter has started regarding how ICANN will relate henceforth to Africa. more

Topics

Threat Intelligence

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days