Featured Blogs

Latest

A Few More Thoughts on Email Authentication… errr… Trust

Mike Hammer's thoughtful article, A Few Thoughts on the Future of Email Authentication, should trigger thoughtfulness in the rest of us. Email abuse has been around a long time. Anti-abuse efforts have too. Yet global abuse traffic has grown into the 90+% range, with no hint of trending downward. The best we hear about current effectiveness is for last-hop filtering, if you have the money, staff and skills to apply to the problem... more

ICA to ICANN: The IRT Must Open Up Or Be Stripped of Official Status and Support

On April 21st the Internet Commerce Association submitted a formal request to Mr. Frank Fowlie, ICANN Ombudsman, requesting an immediate investigation of the non-compliance of the Implementation Recommendation Team (IRT) with applicable provisions of ICANN's Bylaws. The IRT was created by a March Resolution adopted by the ICANN Board during its Mexico City meeting, and was charged with proposing "solutions" to the concerns of trademark holders. Unfortunately, the IRT has chosen to operate in a non-transparent manner... more

TWC Does the Right Thing - Again!

In response to customer feedback, Time Warner Cable has discontinued its trials of tiered Internet service. [Corporate Announcement here.] It was quite a stuff-storm, but to TWC's credit, they put their finger up, felt the howling gale, and changed course right away. This is in marked contrast to their larger competitor, Comcast... more

Is It Time to Supplement Desktop Security Protections?

Internet users are acutely aware of their exposure on the Internet and clearly concerned about their safety. Increased downloads of scareware as Conficker made headlines in the mainstream media are only the latest evidence. Desktop software is often viewed as a one-stop shop for fighting Internet threats such as viruses, worms and other forms of malware and phishing. These solutions have served us well but more protections are needed to address the dynamic and increasingly sophisticated web based exploits being launched... more

YouTube’s Fine - Analysts Don’t Understand Internet Peering

As widely reported, Credit Suisse analysts have estimated Google's YouTube may lose $470M in 2009 and more in the future. However, their estimates say Google will pay $360M for bandwidth in 2009. I don't know how Google figures their cost of bandwidth, but anyone who understands anything about Internet transit/peering knows Credit is way off base. more

What to Do with Skype?

Without rehashing the mainstream headlines, it's clearly on the table now that eBay has given up trying to create synergies with Skype, so the focus now is on making the best of things as distinct entities. The preferred route for eBay would be to keep Skype and recoup their investment via an IPO sometime next year. That would certainly bring an end to things with both parties leaving on a high note. Of course this hinges heavily on the state of capital markets... more

A Few Thoughts on the Future of Email Authentication

With the Online Trust Alliance Town Hall Meeting and Email Authentication Roundtable next week as well as the RSA Conference, I decided to pause and think about where we are and where we might be headed with regard to email authentication. Over the years, many of us have collectively worked to provide a framework for authenticating email... more

New gTLD Comment Period Closes

Internet Corporation for Assigned Names and Numbers (ICANN) has been holding a public comment period on the second draft of the new generic Top-Level Domains (gTLD) handbook. This period was due to close yesterday. Prior to yesterday afternoon there was a healthy number of comments, but in the past 24 hours a significant number of new comments have been submitted... more

The Cybersecurity Act of 2009

Four senators (Rockefeller, Bayh, Nelson, and Snowe) have recently introduced S.773, the Cybersecurity Act of 2009. While there are some good parts to the bill, many of the substantive provisions are poorly thought out at best. The bill attempts to solve non-problems, and to assume that research results can be commanded into being by virtue of an act of Congress. Beyond that, there are parts of the bill whose purpose is mysterious, or whose content bears no relation to its title. more

A Tribute to the Father of the RFC, Dr. Stephen D. Crocker

40 years ago the Request for Comments (RFC) process for the Internet was born. The RFC process continues to be the way Internet protocols are expressed today. We have one very special man to thank for this and his name is Dr. Stephen D. Crocker. He has played a key role in shaping the modern day Internet. For this, I felt that a special tribute to him was in order as we take a look at his countless contributions from the foundation of the Internet to the Internet as we know it today. more

ICANN and the Hyper-Aggressive Trademark Owners: The “Monster Test”

We read and hear a lot of complaints from trademark interests about allegedly rampant cybersquatting and other forms of trademark infringement, but it's rare to see a story about reverse domain name hijacking and other abuses committed by them. That's what made it so refreshing to see an article in the Saturday, April 4th Wall Street Journal titled "The Scariest Monster of All Sues for Trademark Infringement – Fancy Audio-Cable Outfit Defends Its Brands; A Mini Golf Course Fights Back". more

TLD Rights Protection Mechanisms

Potential trademark Rights Protection Mechanisms (RPM) at the 2nd level can be divided into three main areas -- each defined by their time relative to Top-Level Domain (TLD) launch... Of these, we believe the third, "After Launch," is the most fruitful path to explore. We believe it offers the most potential to protect the rights of trademark holders, the best balance between TM rights and the legitimate rights of others who may want to register names , and the most benefit to the trademark community at the lowest cost to them... more

Why DNS Is Broken, Part 1: Trust

So this Internet thing, as we discussed in our last article, is broken. I promised to detail some of the specific things that are broken. Implicit trust is the Achilles heel of the Internet... All of the communication between the resolver and the DNS server is in plain text that can be easily seen and changed while in transit, further, the resolver completely trusts the answer that was returned... more

Government Regulation of Cybersecurity: Partnership (or Power Grab) in the Making?

A cybersecurity bill introduced in the U.S. Senate on April 1st, 2009 would give the United States federal government extraordinary power over private sector Internet services, applications and software. This proposed legislation is a direct result of a review ordered by the Obama administration into government policies and processes for defending against Internet-born attack. The focus of the bill, according to a summary released by the sponsoring senators, is on establishing a new partnership between the public and private sectors in a joint effort to bolster Internet security... more

World-Leading Municipality Initiative Thwarted by Incumbent

The ongoing witch-hunt from the incumbent telcos in the USA against municipalities that are trying to build their own broadband networks is continuing unabated. This is nothing new... With the economic crisis there has been a new focus on regulatory rules and the importance of the common good, next to the free market. However that message has not yet got through to the incumbent players in the USA. more

Topics

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days