Featured Blogs

Latest

VoIP Security Predictions for 2009

Here are my VoIP and Voice security predictions for 2009, limited to just a few, key predictions... The poor economy will slow the adoption rate for VoIP and Unified Communications (UC). This will continue to limit the size of the enterprise VoIP deployments for potential hackers to exploit. VoIP/UC will continue to be mostly an internal/campus application where the threat level for attack is low, so deployments will be largely secured along the same lines as other data network applications. more

Top Ten List of Needed FCC Regulatory Reforms

Honesty is the best policy. At the risk of anthromorphizing a regulatory agency, at the very least the FCC has not told the complete truth, or put itself in a position not to know the truth. The FCC has contributed to debates about what constitutes credible facts and statistics, and what this data means. For example, soon-to-be former FCC Chairman Kevin Martin asserted as the gospel truth his factual conclusion that cable television operators collectively have a 70% market share... The FCC should acknowledge that it may not know all the facts. more

Domain Name Brand-Sharing Starts With Embracing Web 2.0

Irrespective of which solution to the current domain name brand-sharing impasse ends up being adopted by brand owners (option 1, option 2, or a combination), the owners must first understand and embrace current trends in online communications, information gathering, and entertainment. Thus, for a solution to succeed the corporate mindset toward new technologies needs to change; after that brand owners can work cooperatively with the domain name industry (owners and institutions) to increase the aggregate pie. more

Law Requiring Sex Offenders to Hand Over All Internet Passwords Going Too Far?

Maybe you've seen one of the news stories about the revised Georgia statute (Georgia Code ยง 41-1-12) that now requires sex offenders to turn their Internet passwords, screen names and email addresses over to authorities. The purpose of the revised statute is to give authorities the ability to track what sex offenders are doing online, to, in the words of one news story, "make sure" they "aren't stalking children online or chatting with them about off-limits topics." more

A Noteworthy Report on Fast Flux Hosting

This very interesting document was released by ICANN's Generic Names Supporting Organization (GNSO) for public comment yesterday. And it asks some fundamental questions while at the same time pointing to sources such as the Honeynet Alliance's reports on fast flux. more

Obama’s Tech Stimulus Plan: Health IT, Broadband, and Smart Grid

Steve Lohr has a nice piece in the New York Times ('Technology Gets a Piece of Stimulus,' 26 Jan 2009, p. C1) this morning about the role that technology and innovation will play in the economic recovery (aka stimulus) bill supported by the Obama Administration. In the past, health IT deployment has been approached as an engineering problem: what computers have to be part of which networks exchanging which types of data? This loses sight of the purpose of electronic medical records... more

Monster.com Response to Security Breach Unacceptable

As some of us are continuing to learn this week the Monster.com service has again been successfully hacked. According to a security bulletin posted on Monster.com on January 23rd, 2009, the intruder gained access to the user database, while no resumes were apparently compromised... As a user of Monster.com what I find incredibly upsetting about this situation is that I had to find out about this through a security blog. more

Security Psychology

I just came across a post telling of the Security and Human Behavior workshop. As some of you may be aware, I've been researching this subject for about two years now, and I am very excited that a conference has now happened! It means I did not waste the last two years of my life after all! more

Tough Economy Requires Knowledge and Vigilance Online

If current predictions are correct, 2009 will be a tougher year than 2008 in terms of the economy. In tough economic times such as these it becomes increasingly important for us to follow recommended safety practices when going online. As the numbers of Internet-related fraud and financial scams continue to increase we should expect the current economic situation to produce more victims of cybercrime. Knowledge and vigilance are the keys to remaining safe while online. more

Internet Population Passes 1 Billion, and We’re Still Afraid

We're learning this week that we have officially passed the one billion number in terms of people using the Internet. Eric Schonfeld writes in his article on TechCrunch that the number is probably higher than that. One billion is a staggering number, even though it makes up only 15 to 22 percent of the world's population. Nevertheless, those one billion Internet users give us a lot to deal with on their own in terms of social and security issues on the web. more

That Letter to ICANN from the NTIA

A cranky letter from the NTIA to ICANN, submitted in late December during ICANN's comment period for new top-level domains, has encouraged the awkward coalition of those opposed to new TLDs. The NTIA (National Telecommunications and Information Administration), a division of the Department of Commerce, is the agency tasked with being ICANN's watchdog. So a letter from them carries some weight, though not as much as some people think... more

VoIP: Definitely Not Dead Yet, the Sequel

I don't usually write sequels to my articles, but this time, it's warranted. My last column, "VoIP in 2008 -- I'm Not Dead," served as a year-end review and, for me, there were a lot of interesting things in 2008 related to VoIP that formed the basis of that article. I did not intend to rattle cages, but it did, and set off a lot of subsequent conversation, primarily in the blogospheremore

With the New US CTO, Why Not a New OCA: Office of Connectivity Advocacy

We need a positive strategy for assuring connectivity. Instead of trying to fix telecom we should be working to take advantage of what we have and build vital, even if mundane applications like telemedicine and broaden our access to information while empowering communities. By realizing the value in our existing infrastructure and encouraging the creativity we can provide immediate benefits to our economy and our safety. We need a "Connectivity Strategy" with a champion... more

Carriers Are Trying to Take Back Control of the Home Network

With all the focus on neutrality in the provider networks we must not lose sight of what is happening in our own homes. As with some of the efforts to make the networks work better (as measured in the providers' paternalistic) view, their attempt to retake the home is about serving us better by reducing the operators' costs. "Better" is of course in terms of the operator's own measures. It's not quite the same as in 1995 when providers opposed home networks and want to charge us for each machine... more

Why 2008 Was a Milestone Year for IPv6

The beginning of the year saw IPv6 added to the DNS root, closing a major hole for IPv6-only communication. In mid-year, the US federal government's IPv6 mandate came into effect, requiring all federal IP backbones to support IPv6. While the mandate didn't have anywhere near the effect that many had hoped for, it did spur many vendors to add IPv6 support to their products. The amount of observed IPv6 traffic increased considerably, but we still lack good data for how much IPv6 is being used. So, where were we at the end of 2008? more

Topics

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days