Featured Blogs

Latest

Video and Broadband Demand

One of the obvious drivers of broadband usage is online video, and a study earlier this year by the Leichtman Research Group provides insight into the continuing role of video growth in broadband usage. The company conducted a nationwide poll in the US looking at how people watch video, and the results show that Americans have embraced online for-pay video services. more

Unintended Consequences of Submarine Cable Deployment on Internet Routing

The network layer of the Internet routes packets regardless of the underlying communication media (Wifi, cellular telephony, satellites, or optical fiber). The underlying physical infrastructure of the Internet includes a mesh of submarine cables, generally shared by network operators who purchase capacity from the cable owners. As of late 2020, over 400 submarine cables interconnect continents worldwide and constitute the oceanic backbone of the Internet. more

Overcoming Obstacles to Full-Scale Business Intelligence Adoption in 2021

Data analytics isn't just for large organizations anymore. As businesses and community collectives increasingly move their operations into digital spaces, the vast amounts of data being collected pose an opportunity for them to get to know their stakeholders better. While the security implications of this migration are hard to be taken lightly, the potential for game-changing insights is likewise enormous.  more

NTIA Objects to Planned o.com Auction

According to media sources, the National Telecommunications and Information Administration (NTIA) wrote to Verisign last Friday, objecting to the company's plan to auction o.com to the highest bidder. The planned release for o.com - described by the Second Amendment to the .com Registry Agreement and intended as a pilot for the remaining reserved single-character .com names - involved an opaque consideration process that ignored community input and set aside hard-won trademark protections developed by stakeholders in order to maximize dollars earmarked for an unidentified cadre of non-profit organizations. more

Cast Your .vote for the Most Interesting New gTLD Development in Q4

2020 has been extremely eventful, so it follows that the domain industry has continued to experience perpetual change, progress and uncertainty in the last three months of the year. In our Q4 New gTLD Quarterly Report, MarkMonitor experts analyze topical registration activity, launch information, .brand growth and DNS abuse, and share a list of upcoming industry meetings for 2021. more

The Next Green Initiative is Internet Sustainability

We are all aware of the pollution caused by burning coal and combusting oil. The results are obvious: exhaust spewing from vehicles, factories, and power plants. Many of us don't realize we are actively contributing to the unnecessary burning of energy (natural gas and coal in the US) to power the Internet. We wag our fingers at Internet Service Providers (ISPs) and data centers, but the fact is that our own organizations are wasting electricity every single hour out of ignorance or apathy. more

Understanding Broadband Oversubscription

It's common to hear that oversubscription is the cause of slow broadband -- but what does that mean? Oversubscription comes into play in any network when the aggregate subscribed customer demand is greater than the available bandwidth. The easiest way to understand the concept is with an example. Consider a passive optical fiber network where up to 32 homes share the same neighborhood fiber. more

DNS Oblivion

Technical development often comes in short, intense bursts, where a relatively stable technology becomes the subject of intense revision and evolution. The DNS is a classic example here. For many years this name resolution protocol just quietly toiled away. The protocol wasn't all that secure, and it wasn't totally reliable, but it worked well enough for the purposes we put it to. more

Remediating U.S. 5G Global Supply Chain Security Engagement

For nearly the past four years, the Trump Administration has purported to treat 5G supply chain security through empty political gestures such as network equipment banning. The disinformation reached its absurd zenith subsequent to the election with the Q-Anon myth of the Kraken. (The Myth advanced by Trump attorneys asserted the long-deceased Hugo Chavez working with China was corrupting voting machine software to deprive Trump of another term.) more

International Law and Cyberspace: It’s the “How”, Stupid

The Internet has enhanced freedom of communication, ignored national borders, and removed time and space barriers. But the Internet sphere was never a law-free zone. Already ICANN's "Articles of Incorporation" (1998) constituted that the management of critical Internet resources has to take place within the frameworks of "applicable national and international law". more

Can We Advance Policies Towards a Safe Transnational Internet Market for Medicines?

As 2020 draws to a close, it becomes possible to assess the trends from different policy areas that were most impacted by the global pandemic, with health-related policies rising to the top of that list. This article focuses on the sale of medicines using the Internet, as it should, without a doubt, be one of the leading concerns of both the general public and policymakers. There is a disconcerting lack of broader social debate around the subject, even though the need is so great. more

Are There any Cable Companies Left?

Are there any companies left that we can still call cable companies? Everything in the business press still refers to Comcast and Charter as cable companies and AT&T and Verizon as telephone companies. It's getting harder to justify using these traditional labels, and maybe the time is finally here to just start calling them all ISPs. After all, these four companies collectively have 80 million broadband customers... more

97% of All Global 2000 Companies at Risk from SAD DNS Attack

There is a new threat in town known as "SAD DNS" that allows attackers to redirect traffic, putting companies at risk of phishing, data breach, reputation damage, and revenue loss. What is SAD DNS? No, it isn't the domain name system (DNS) feeling moody, but an acronym for a new-found threat -- "Side-channel AttackeD DNS" discovered by researchers that could revive DNS cache poisoning attacks. more

A Balanced DNS Information Protection Strategy: Minimize at Root, TLD; Encrypt When Needed Elsewhere

Over the past several years, questions about how to protect information exchanged in the DNS have come to the forefront. One of these questions was posed first to DNS resolver operators in the middle of the last decade, and is now being brought to authoritative name server operators: "to encrypt or not to encrypt?" It's a question that Verisign has been considering for some time as part of our commitment to security, stability and resiliency of our DNS operations and the surrounding DNS ecosystem. more

Protecting an Enterprise from Cyber Catastrophe

We are suffering an epidemic of cyberattacks while in a viral pandemic. This post is for those who have responsibility for assuring that the IT-based services offered by their enterprise can quickly recover in the case of successful cyber-attack or other disaster. University of Vermont Medical Center (UVMMC) is an excellent hospital. I owe my life to treatment there and am grateful for both the skill and the kindness of UVMMC staff. They have been devastated by a cyber-attack. more

Topics

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days