DNSSEC continues to gain momentum as network operators and domain owners watch and learn from early adopters. The learning process is made easier by efforts such as the ongoing work conducted by researchers at Sandia labs to methodically identify and categorize the kinds of problems that are occurring. more
The sixth annual Counter-eCrime Operations Summit (CeCOS VI) will engage questions of operational challenges and the development of common resources for the first responders and forensic professionals who protect consumers and enterprises from the ecrime threat every day. This year's meeting will focus on the shifting nature of cybercrime and the attendant challenges of managing that dynamic threatscape. more
A number of conversations have recently converged on a single problem: how to match applications to network access. Let's unpeel this issue... When I was Chief Analyst at Telco 2.0, we proposed there was a significant untapped market opportunity for network operators to bundle together access with content, applications or services. The revenue opportunity is to charge the providers of those services for delivering fit-for-purpose data at bulk wholesale prices. This is the "postage problem"... more
Since the establishment of the RIPE NCC, 5,000 Local Internet Registries (LIRs) have closed. We wanted to find out why. Many of them were probably victims of the burst of the dotcom bubble. But how many? And which countries were mostly affected? How many closures were the results of mergers? We've got answers. more
DNS is not something that most people think about when using the Internet. Neither should they have to: the DNS is just part of the infrastructure in the same way that IP addresses are. The only time a user ought to notice the DNS is when it breaks (and it should never break). If that's true, then we ought to expect any Internet client - including web browsers - to use the very same infrastructure as everything else and for the DNS resolution mechanisms to be the ones offered by the operating system. What makes browsers different? more
Although ICANN is now getting a lot of ridicule for the "glitch" in its TLD application System, it deserves some praise and respect for the results of its April 10 board meeting. In that meeting, the board showed the involved community - and the rest of the world - that it is no longer going to be stampeded by extra-procedural political pressure to make yet another round of hasty amendments to its new TLD program's policies and procedures. more
Last week, the Internet Corporation for Assigned Names and Numbers (ICANN) was forced to extend the deadline for the new gTLD application to April 20th, after the application system crashed and the technical issue which enabled some applicants to see file names and user names that belonged to other applicants. ... ICANN's decision to extend the deadline is reasonable in the circumstances. more
There were long faces all over the new gTLD ecosystem yesterday -- applicants, consultants and technical operators alike -- when ICANN took their Application System (TAS) offline and announced that it would not be brought back up for 5 days. As a result, the long-anticipated close of the first new gTLD application window was pushed back from April 12 to April 20, 23:59 UTC. You could almost hear the groans of dismay spreading over social cyberspace! more
Does the "technical issue" announced today in ICANN's TLD Application System (TAS) and the subsequent extension of the submission deadline call into question the stability and integrity of the new gTLD program? This development underscores the notion that ICANN could consider a more metered and staged approach to the introduction of gTLDs... more
In case you haven't been watching cyber news recently, last week various security researchers published that Macs were infected by the Flashback Trojan and that the total number of infections worldwide was 600,000. This number was published by a couple of blogs. I debated writing about this topic since we had a previous Mac outbreak last year that initially spiked up, caused Apple to go into denial about the affair before issuing a fix, and then the malware kind of went away. Will this follow the same pattern? more
Today is April 12 2012. It's also meant to be the day that the new TLD application window closes. Now it's not. ICANN has spectacularly failed to manage the new TLD process and will miss its own deadline by over a week... In a rather badly worded announcement ICANN states that it's extending the deadline for online applications (the only way to apply) until April 20th at 23:59 UTC. more
Most of the good thrillers I tend to watch have spies and assassins in them for some diabolical reason. In those movies you'll often find their target, the Archduke of Villainess, holed up in some remote local and the spy has to fake an identity in order to penetrate the layers of defense. Almost without exception the spy enters the country using a fake passport; relying upon a passport from any country other than their own... So, with that bit of non-fiction in mind, why do so many people automatically assume that cyber-attacks sourced from IP addresses within China are targeted, state-sponsored, attacks? more
While a great deal of attention has recently been paid to the enormous amount of change that is taking place at the edge of the network with smartphones, tablets, apps, Web2.0 etc, massive changes are also underway on the network side. The current network has been designed over a period of thirty years and it is due for a serious overhaul to keep abreast of changes in the industry in general. more
Like the scene of a movie in which a biblical character holds back the mighty sea and is about to release the tide against his foes, BYOD has become a force of nature poised to flood those charged with keeping corporate systems secure. Despite years of practice hardening systems and enforcing policies that restrict what can and can't be done within the corporate network, businesses are under increasing (if not insurmountable) pressure to allow a diversifying number of personal devices to connect to their networks and be used for business operations. more
Even as we increasingly discover that every facet of our modern lives now revolve around, and are dependent on the Internet, for which reason its availability, functionality, safety, stability and security are now of great and continuing concern to all of us. These issues have a profound impact on its overall governance. To most of us, during the past three decades, the Internet has always been available, stable, affordable and open; and it should continue this way even as it is controlled and administered in a secure manner... more
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byCSC
Sponsored byRadix