Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Is Verisign a Monopoly? Does It Matter?

Senator Elizabeth Warren and Rep. Jerry Nadler recently wrote a letter complaining that VeriSign overcharges for .com domains due to its market power. They sent it to the Department of Justice and the National Telecommunications and Information Administration (NTIA). While you can make a reasonable case that the claim is true, two more interesting questions are "Why now?" and "Why bother?" more

UN Cyber Diplomacy II: Cybersecurity and Autonomous Weapon Systems

Cybersecurity and artificial intelligence were among the key topics at the 79th UN General Assembly (UNGA). UNGA's 1st Committee, responsible for disarmament and international security, concluded its negotiations in mid-November 2024. It discussed the 3rd Annual Progress Report (APR) of the Open-Ended Working Group (OEWG) and adopted a resolution that recommends, inter alia, the establishment of a new permanent cybersecurity mechanism within the UN system. Furthermore, it adopted two resolutions on autonomous weapon systems (AWS). more

Multistakerholderism and Its Discontents: A Reply

Twenty years after multistakeholderism helped save the Free Internet and present-day Internet governance from a potentially existential crises, the term is again triggering some strong emotions. There are very real questions around definitions, accountability, participation, and even legitimacy in all multistakeholder models. Within Internet governance, there are declared enemies of the multistakeholder approach... more

Fragmented Connections: How Network Fees Threaten Brazil’s Internet

The debate surrounding network usage fees in Brazil has intensified following the approval of Bill 469/2024 by the House of Representatives' Communications Committee in early December 2024. This bill prohibits telecommunications operators from charging internet companies based on data traffic. While this is merely a preliminary step in a lengthy legislative process, it signals that proposals from telecom companies to implement network usage fees are unlikely to gain traction. more

A Collision Between Tech Policy and Foreign Policy: the UN Cybercrime Convention

Sometime by year-end, the UN General Assembly (UNGA) will vote on the proposed UN Convention Against Cybercrime. The treaty is opposed by most civil liberties organizations and Internet businesses, although the US position appears uncertain, mostly for reasons of foreign policy. more

Exploring the Impact of WHOIS Data Redaction on Unsolicited Emails

In the digital age, personal data protection has become paramount, with regulations like the General Data Protection Regulation (GDPR) shaping global practices. One area significantly affected is the public availability of WHOIS data, a critical resource in the domain name system. WHOIS traditionally provided detailed contact information for domain registrants, but privacy measures have redacted much of this data in recent years. more

A Review of the 2024 Threat Landscape and Implications for Domain Security

The cybersecurity landscape in 2024 has been characterised by unprecedented complexity and rapidly evolving threats, presenting significant challenges for organisations across all sectors. As the digital attack surface expands and threat actors employ increasingly sophisticated techniques, domain security has emerged as a critical component of a robust cybersecurity strategy. more

Starlink Backhaul for Rural Community WiFi: A Game Changer in Kenya?

Starlink launched maritime service in July 2022, and by January 2023 Elcome International LLC, a maritime technology solution provider since 1970, had installed multi-antenna Starlink Maritime arrays on two super yachts with more than 100 passengers and crew. Elcome launched its Starlink maritime service in May 2024 and now has over 3,000 terminals under management. more

International Law of Critical Internet Infrastructure [CII]: A Comparative Analysis

On Friday December 13, 2024 at 10:00–12:00 CET (09:00-11:00 AM UTC) the Lodz Cyber Hub at the University of Lodz Law School, an ICANN EURALO ALS, and the United Nations University – Comparative Regional Integration Studies (UNU-CRIS) hosts an online workshop 'International Law of Critical Internet Infrastructure: A Comparative Analysis of Europe and China'. more

Starlink in the Spotlight: Growth, Challenges, and Future Ambitions

There is a lot of speculation that Starlink is positioned to get a lot more federal subsidy from the BEAD grant program. There are a few things that have to happen for that to come to pass, but that is not the only news about Starlink these days. Starlink announced in September that it reached four million customers worldwide. What is most impressive about that announcement is the rate of growth, with the company just hitting the three million customer mark in May of 2024. more

Copper Theft Costs $1.5 to $2 Billion Annually: A Growing Crisis with Severe Consequences

I recently saw that AT&T is offering a $10,000 reward to anybody who provides information that leads to the arrest and conviction of people stealing copper wiring. The particular announcement is related to a recent theft of copper in South Dallas, Texas, but there have been numerous other thefts. This is not a small problem, and the estimated value of stolen telephone copper is between $1.5 and $2 billion annually. more

Elizabeth “Jake” Feinler: The Mother of Whois

Elizabeth "Jake" Feinler, known as the "Mother of Whois," transformed internet infrastructure as the ARPANET Network Information Center's lead. Her work in organizing data and pioneering Whois set the foundation for modern internet protocols. A trailblazer in technology, she championed inclusivity, mentoring women and minorities, while her legacy endures as a cornerstone of the digital age. more

Cybersecurity Standards Competition

The conventional wisdom in the world of legacy standards-making is that monolithic standards produce, if not accelerate, better products and services. Conformance, certification, and associated labelling schemes to implement those standards were believed essential to trust. Although competition law seems now evolving in the other direction, regulatory standards-making bodies themselves have been accorded considerable anticompetitive cartel liability protection. more

Availability Analysis of Brandable Variant-String Domain Names

For any entity looking to launch a new company or other initiative, a primary requirement is often the selection of an appropriate brand name and the acquisition of a relevant associated domain name. In light of the increasing shortage of short, unregistered memorable names on popular domain name extensions (TLDs), many organisations are choosing to adopt novel or invented brand names and/or consider the use of alternative TLDs. more

Crypto - The New Market for Lemons

Ever buy a used car only to realize later that you've purchased a lemon? That scenario occurs because of information asymmetry between the seller -- who knows the car is a lemon -- and the buyer who doesn't. Without transparency, the market assumed that any used car for sale is a lemon, so that drove down the price of good used cars. The good news is that thanks to the Internet, buyers now have access to data that can help them determine if a car is a lemon or a good buy. more

Topics

DNS

Sponsored byDNIB.com

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days