Featured Blogs

Latest

Spam Continues to Drop

The chart in this post shows the amount of inbound mail that we see, both spam and non-spam, over the past three and a half years. You can see in the above that the amount of good mail that we see has continued to increase over time. This is because of an increased customer base, not because the total amount of good mail worldwide has gone up... However, the amount of spam has plummeted from 23,000 in mid 2010 to 5000 now, a drop of over 75%. The contrast couldn't be starker -- spammers are not spamming as much anymore. It almost looks like the battle against spam is almost over. What's still left to do? more

Anonymous, LulzSec, and the Option of Internet Security

As hacking groups such as Anonymous and LulzSec continue to make headlines, many of us in the Information Security field can only sit back and shake our heads. The large number of successful system breaches, web site defacements, and the publication of confidential data is not at all surprising, and for the most part was only a matter of time. more

Authentication Methods Used in the RIPE Database

Objects in the RIPE Database can only be modified by those authorised to do so. For instance, an object representing a certain range of IP addresses assigned to an organisation by the RIPE NCC or a Local Internet Registry (LIR) can be modified by the organisation holding that address space. Each database object contains one or more attributes referencing the maintainer(s) of that object. In a maintainer (MNTNER) object, credentials are listed for those who are authorised to modify any object referencing that MNTNER object. more

Defense in Depth for DNSSEC Applications

At the time of this writing DNSSEC mostly does not work. This is not a bad thing - in fact it's expected... There is a significant last-mover advantage DNSSEC deployment (or IPv6 deployment) and that can't be helped. It's all in a good cause though - everybody knows we need this stuff and some farsighted contributors put a lot of money and other resources into DNSSEC years or decades ago to ensure that when the time comes the world will have a migration path. Sadly, this leaves current investors and application designers and developers wondering whether there's a market yet. more

FttH Is Not About High-Speed Internet Access - It Is About the Internet of Things

The future of our communications infrastructure will to a very large extent be based on the Internet of Things (IoT). What this means is that hundreds of millions of devices will be connected to the national broadband networks (NBN), gathering massive amounts of information and providing feedback in real time. In any single country, the electricity grid alone will have tens of millions of sensors and devices connected to deliver the energy efficiencies that we all so desperately need. more

Kudos to ccTLD Registries for Taking Measures to Improve Security

When I first wrote about Domain Registry Locking over a year and a half ago, Verisign was the only Registry offering a true Registry Lock Service. Of course, not long after, Neustar announced their Registry Lock Service too. Recently however, a number of ccTLD Registries have also adopted Registry Locking programs... more

ICANN Finds Its Voice

I think we are finally getting somewhere: ICANN is no longer fluttering flusteredly whenever a lobbying group sends a nastygram over the transom. Case in point: a Association of National Advertisers (ANA) that arrived a few days ago, full of bombast and muscle-flexing, demanding that ICANN immediately stop the new gTLD program until a long list of demands from the ANA were met, or else the ANA would be forced to take some Very Scary Actions... more

Integrating the GAC More Effectively

We all may have breathed a sigh of relief when the ICANN Governmental Advisory Committee (GAC) and the Board concluded their eleventh-hour negotiations on new generic Top-Level Domains (gTLDs) with some measure of success, but we can all agree that panicked policymaking is, at best, less than optimal. ICANN needs to integrate GAC input more effectively. The Final Report recently issued by the Joint Working Group (JWG) of the ICANN Board and the GAC contains several thoughtful and productive recommendations. more

DDoS Attacks: Don’t Be In Denial of the Risks

Unlike traditional attacks by hackers which breach a business's security systems, resulting in defaced websites, intellectual property theft and/or customer data theft, a DDoS attack focuses on making a business's Internet connected infrastructure (e.g. web servers, email servers, database servers, FTP servers, APIs, etc.) unavailable to legitimate users. A business's brand reputation, which can take years to establish, can be swept away in just a few hours from a single DDoS attack in the same way a natural disaster like a flood or earthquake can impact a traditional brick and mortar business. more

Survey: Public Interest Representation in the Information Society

All civil society organisations and other self-identified public interest representatives in the regime of Internet governance and related areas of information and communications policy are invited to complete a survey titled Public interest representation in the information society. This survey contributes towards the development of a map of Internet governance... more

Another Day, Another Set of Hacking Attacks. News At 11.

While reading Reuters I came across a news article indicating that a number of high profile agencies - from the United Nations to the Canadian Government to government of Taiwan - were broken into over a period of the past five years. ... I'll say it right now, even though I haven't been briefed on it. It was China. more

Smartphones: Too Smart for Mobile Operators?

In June, the net neutrality debate took an unexpected turn when the Netherlands leap-frogged the USA to became the first country to legislate for mobile net neutrality. Business models for fixed and mobile networks must shift toward volume charges. The net neutrality debate has been seen not having much relevance outside the USA because the plight of carriers there was aggravated by unlimited usage. more

The Rising Technical Challenges of Networking at Home

For me, one of the more interesting sessions at the recent IETF 81 meeting in July was the first meeting of the recently established Homenet Working Group. What's so interesting about networking the home? Well, if you regard challenges as "interesting", then just about everything is interesting when you look at networking in the home! more

Cloud Brokerage and Other Business Opportunities

The market for cloud computing is getting more interesting every day. There is still a long way to go, as the success of cloud computing depends not only on high-speed networks, but also on capacity, robustness, affordability, low latency, ubiquity, security, privacy and reliability. Of course, the ideal infrastructure would be nationwide FttH networks, but obviously we can't wait for that... more

Who Will Give Birth to the gTLD’s First Billion-Dollar Domain Baby?

When all you have is a hammer, everything appears to be a nail. The generic Top-Level Domains (gTLDs) are not just about trademark filing and battle posturing or cyber-squatting. They are about the potential to create unusual global intellectual properties offering multiple opportunities for rapid image expansion and - most importantly - the achievement of market domination via name identity. more

Topics

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Threat Intelligence

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days