Featured Blogs

Latest

Last Minute Surge of Opposition to VeriSign .NET Auto Renewal

The current .NET Registry Agreement between ICANN and VeriSign is due to expire on 30 June 2011. On April 11 2011 ICANN posted a proposed draft renewal agreement for public comment. Under the terms of the existing agreement, which contracted a 6 year term starting July 1 2005, renewal is automatic unless VeriSign commits some egregious breach of terms. more

The ICANN Accountability and Transparency Review Team Recommendations: To Implementation, And Beyond

Buzz Lightyear, the astronaut character from the movie Toy Story, is known for his tagline, "To infinity, and beyond!" ICANN can take a lesson from the ebullient Buzz with respect to accountability and transparency. Just as Buzz believed he could fly beyond infinity, ICANN should view full implementation of the Accountability and Transparency Review Team (ATRT) recommendations not as the last stop, but as the next stop on its important journey of accountability and transparency. more

IP Addresses as Money

It's no secret that the supply of IPv4 addresses, on which the Internet has been based since the dawn of digital time, is rapidly running out. The official replacement is much larger IPv6 addresses, but I can report from experience that the task of switching is not trivial, and for a long time there will be a lot of the net that's only on IPv4. So once the initial supply of IPv4 addresses run out, and the only way to get some is to buy them from someone else, what will the market be like? more

Facebook.com/Brand vs. a New TLD: What’s a Brand to Do?

Last week I published an article in Ad Age that the editors titled "Should your company jump on the dot-brand bandwagon?" I received several emails and LinkedIn requests from advertising and PR agencies as well as brand managers. One of the questions I received had to do with my opinion on whether brands that are currently promoting themselves via Facebook, e.g., "Find us on Facebook.com/brand," should consider the new Top-Level Domains (TLDs). more

The Ugly End of the Phone Network

I was a little early. "By the end of President Obama's first term, there won't be any more copper landlines left in the country, I blogged just after Obama had been elected. Before that I'd prophesized the end of POTS (Plain Old Telephone Service) by 2010. Nevertheless, the end is nigh. And it's gonna be ugly without some planning. more

ICANN Successfully Tiptoes Through Political Minefield With New TLD Applicant Guidebook

ICANN released its sixth version of the draft Applicant Guidebook for the new Top-Level Domain (TLD) program in April following three years of debate surrounding the rules and procedures that will outline how potential applicants will apply to own their own piece of Internet real estate. Overall, the response has been positive. more

The Crimeware Infection Lifecycle

The distribution and installation of malicious and unauthorized software has evolved consistently throughout the 21st Century. The evolutionary path from annoying viruses, to destructive malware and on to financially driven crimeware, is well documented and can even be conveniently traced via the parallel evolution of technologies that were designed to counter each new aspect of the then contemporary threat. more

Debugging Legislation: PROTECT IP

There's more than a hint of theatrics in the draft PROTECT IP bill that has emerged as son-of-COICA, starting with the ungainly acronym of a name. Given its roots in the entertainment industry, that low drama comes as no surprise. Each section name is worse than the last: "Eliminating the Financial Incentive to Steal Intellectual Property Online" (Sec. 4) gives way to "Voluntary action for Taking Action Against Websites Stealing American Intellectual Property". more

Understanding the Modern DDoS Threat

The breadth of cyber threats that an organization must engage with and combat seemingly change on a daily basis. Each new technology, vulnerability or exploit vector results in a new threat that must be protected against. Meanwhile some forms of attack never appear to age -- they remain a threat to business continuity despite years of advances in defensive strategy. One particularly insidious and never-ending threat is that of the Distributed Denial of Service (DDoS) attack. more

IPv6 RIPEness: One Year Later

A year ago, the RIPE NCC introduced IPv6 RIPEness -- a system that rates IPv6 deployment of Local Internet Registries (LIRs)... Now, one year later, the numbers have gone up... In absolute numbers: more than 3,000 LIRs have IPv6 address space. This means that the RIPE NCC has made more than 1,100 IPv6 allocations within 12 months. more

Creating, Protecting and Defending Brand Equity - Part 3

In the final of my three-part post series about how to protect your trademark against misuse, I will focus on proactive searching and policing and the benefits these can provide to brand owners. ... Proactive searching and policing of your brand is a prudent step in making sure your name is protectable. This is an advisable first step in naming a product or service. more

The End of the “Skype as Bandit” Era

And so it ends... Skype was always always a fun company to write about because they were always a bit of a rogue. The scrappy little startup that took on the megacorps of the telecom industry... and won in so many ways... look at their leading % of international calls... or the fact that per-minute call costs are now very clearly being commoditized down to zero... more

Responsibilities of the DNS: “Oh YES you will!”, “Oh NO you will not!”

What is the responsibility of the DNS? Should the DNS be responsible for policing traffic across its infrastructure? Should the blocking and blacklisting of names or throttling of query packets be the responsibility of the DNS? From experience I know my opening paragraph has started passionate debates in more than one section of this globe. We at CommunityDNS have found ourselves right in the middle of such heated debates. "Oh YES you will!", "Oh NO you will not!more

Why Isn’t Mobile Malware More Popular?

This is a followup to Wout de Natris' as usual excellent piece on the Enisa botnet report -- pointing out the current state of mobile malware and asking some questions I started off answering in a comment but it grew to a length where I thought it'd be better off in its own post. Going through previous iterations of Mikko's presentations on mobile malware is a fascinating exercise. more

Defending the Network Several Times Over

Modern networks can be attacked in a variety of ways, meaning that companies need different types of protection. This article explains some of the risks involved, and provides some easy ways to deal with them. more

Topics

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days