Featured Blogs

Latest

Want to Help Guide the Future of the MANRS Routing Security Initiative?

Would you like to help guide the future of the Mutually Agreed Norms for Routing Security (MANRS) initiative? As the MANRS community continues to develop new efforts to make the routing layer of the Internet more secure (ex. the equipment vendor program), would you like to help lead the work? The MANRS community is seeking volunteers for its new Steering Committee. The committee will lead the community as it evolves its governance model.  more

5G for Cars – an Idea That Won’t Die

An industry group calling itself 5G Americas has published a whitepaper that touts the advantages of a smart auto grid powered by 5G and the C-V2X technology. This technology is the car connectivity standard that much of the industry has gelled around, replacing the older DSRC standard. Over a decade ago, the FCC became so enamored over the idea of self-driving cars that the agency dedicated the 5.9 GHz spectrum band for the sole use of smart cars. more

Why Domain Security Is Your First Line of Defense to Mitigate Phishing Attacks

According to the Cybersecurity and Infrastructure Security Agency (CISA), most cyberattacks, including ransomware and business email compromise, begin with phishing. Although losses due to ransomware now exceed billions annually, most ransomware protection and response measures don't protect against the most common phishing attacks. Established research shows that phishing attacks most commonly occur from a maliciously registered, confusingly similar domain name, a compromised or hijacked legitimate domain name, or via email header spoofing. more

Explaining Growth in Broadband Demand

I haven't talked about the growth of broadband usage for a while. However, I was explaining the exponential growth of broadband usage to somebody recently, and I suddenly realized an easy way for putting broadband growth into context. The amount of data used by the average broadband user has been doubling roughly every three years since the advent of the Internet. This exponential growth has been chugging along since the earliest dial-up days, and we're still seeing it today. more

RealTimeML Email Recommendation Engine Part V: Sentiment Analysis

In our continuing series on RealTime machine learning recommendations for email, we will discuss the importance of Sentiment Analysis in RealTime for Email. The initial feedback we've received from the field to develop a Sentiment Analysis model has been extraordinary. We initially want to dissect why we feel this model is essential, determine the components needed to serve real-time machine learning recommendations for higher engagement rates before the campaign send, and tailoring sentiment to the types of emails companies send. more

Endpoint Rollbacks & Data Shadow Copies

Recently I was asked by a customer how they can easily set up rollback capabilities on the endpoints in their corporate network. They had seen the marketing hype by various security technology providers that their products included rollback capabilities they could utilize if/when one of their workstations or servers was infected by malware. Having gotten this question more than once, I thought it would be a good subject to share with a broader audience. more

Is Defining Broadband by Speed a Good Policy?

I’ve lately been looking at broadband policies that have shaped broadband, and I don’t think there has been any more disastrous FCC policy than the one that defines broadband by speed. This one policy has led to a misallocation of funding and getting broadband to communities that need it. The FCC established the definition of broadband as 25/3 Mbps in 2015, and before then, the definition of broadband was 4/1 Mbps, set a decade earlier. The FCC defines broadband to meet a legal requirement established by Congress and codified in Section 706 of the FCC governing rules. more

Numerous Lessons We Can Learn From the Facebook Outage and Its Mistakes

It was only a few weeks back, in July of this year, where I remarked that an Akamai report of an outage was unusual for this industry. It was unusual in that it was informative in detailing their understanding of the root cause of the problem, describing the response that they performed to rectify the immediate problem, the measures being undertaken to prevent a recurrence of this issue, and the longer-term measures to improve the monitoring and alerting processes used within their platform. more

Key Findings from the 2021 Domain Security Report

With cybercrime on the rise, companies in 2021 have experienced increased ransomware attacks, business email compromise (BEC), phishing attacks, supply chain attacks, and online brand and trademark abuse. While domain cyber risk is rising, the level of action being taken by Forbes Global 2000 companies to improve their domain security posture has remained unchanged, leaving these companies exposed to even more risk. The risk of not addressing your domain security can be catastrophic. more

Our New Infrastructure

Today, there is demand for more broadband as people realize the importance of being connected to the Internet, whether to access websites, stream entertainment, attend school, attend family events, work remotely, and so much more. This demand has been driven by the success of today's Internet. It is now time to recognize the Internet as infrastructure. The Internet's best-effort approach has allowed us to share the abundant capacity latent in the existing facilities by converting all traffic into packets. more

What Is the Domain Name Expiry Cycle and Why Should You Know About It?

Domain names are registered by the thousands every day. In July 2021, 236,336 domains were newly registered daily on average across all top-level domains (TLDs). Tens of thousands were also newly expired. Other months could be just as busy. "Newly registered" and "newly expired." Those are two terms I often get questions about. Newly registered domains are domains that someone just reserved, typically through a registrar or web hosting company. Newly expired domains, meanwhile, are those domains that someone had reserved but decided to let go for one reason or another. more

Help Us Build a Sustainable European Cloud

Last month, I announced our Open Data Hub to the CircleID community, inviting anyone interested in making the digital sector more transparent to join our efforts. Today, I am excited to share summaries of our three-part series describing our vision for a sustainable European cloud. It’s a key part of our Roadmap to Sustainable Digital Infrastructure by 2030, and one that is meant to not merely challenge the dominance of the big, non-European cloud providers, but offer an entirely different paradigm that is open-source, fair, sustainable, and creates economic opportunities for all. more

Improvements in Undersea Fiber

We often forget that a lot of things we do on the web rely on broadband traffic that passes through undersea cables. Any web traffic from overseas gets to the US through one of the many underwater fiber routes. Like with all fiber technologies, the engineers and vendors have regularly been making improvements. The technology involved in undersea cables is quite different than what is used for terrestrial fibers. A long fiber route includes repeater sites where the light signal is refreshed. Without repeaters, the average fiber light signal will die within about sixty miles. more

The Beginnings of 8K Video

In 2014 I wrote a blog asking if 4K video was going to become mainstream. At that time, 4K TVs were just hitting the market and cost $3,000 and higher. There was virtually no 4K video content on the web other than a few experimental videos on YouTube. But in seven short years, 4K has become a standard technology. Netflix and Amazon Prime have been shooting all original content in 4K for several years, and the rest of the industry has followed. more

What Due Diligence Satisfies Domain Name Registrant’s Representations (UDRP)?

Not infrequently mark owners in disputes under the Uniform Domain Name Dispute Resolution Policy (UDRP) claim that respondents should have been aware that the domain names they registered corresponded to their marks; and from this, urge panelists to draw the inference that the registrations were designed to take advantage of their goodwill and reputation. To test this premise, we need to take a step back for a quick look at UDRP provisions. All it takes to acquire a domain name is to sign a registrar’s registration agreement. more

Topics

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days