Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

3 Processes That Ensure IoT Cybersecurity Compliance

IoT devices have ingrained themselves into almost every aspect of modern life. From home assistants to industrial machinery, it's hard to find a device that isn't connected to a network and gathering data. Despite widespread adoption, IoT cybersecurity compliance remains surprisingly low. A big reason for this is the unique challenges IoT devices pose to operators. more

It’s the Latency, FCC

Section 706 of the Telecommunications Act of 1996 orders the FCC to "encourage the deployment on a reasonable and timely basis of advanced telecommunications capability to all Americans." On October 25, The FCC issued a notice of inquiry (NOI) into how well we are doing and invited comments. The NOI points out that COVID and the concomitant increase in the use of interactive applications has "made it clear that broadband is no longer a luxury... more

Universal Acceptance Issues with .TUBE, ASCII and IDN Domains

This open letter, penned by Rami Schwartz, the CEO of Latin American Telecom LLC, addresses Universal Acceptance issues related to the .TUBE top-level domain (TLD). Published to the ICANN Board, it highlights challenges faced in making .TUBE domains function correctly in popular messaging apps like WhatsApp. more

The Internet Archive Hops Out of the Copyright Frying Pan Into a New and Different Fire

In 2020 a group of book publishers sued the Internet Archive over their Controlled Digital Lending program, which made PDF scans of books and lent them out from the Archive's website. For books still in copyright, the Archive usually limited the number of copies of a book lent to the number of physical copies of the book they had in storage. Several publishers sued with an argument that can be summarized as "that's not how it works." more

Verisign Provides Open Source Implementation of Merkle Tree Ladder Mode

The quantum computing era is coming, and it will change everything about how the world connects online. While quantum computing will yield tremendous benefits, it will also create new risks, so it's essential that we prepare our critical internet infrastructure for what's to come. That's why we're so pleased to share our latest efforts in this area, including technology that we're making available as an open source implementation to help internet operators worldwide prepare. more

A Layered Approach to IG: Cooperation or Crisis!

In an Internet governance agenda that treats diversity of addressing issues as the ultimate end at any cost, technology and its end-users are mere means, and much of the work that sustains the Internet is ignored entirely. As a nation, you are free to initiate different regulations, but when you start getting into the world of infrastructure, you are legislating far beyond the nation-state borders. more

Starlink Has Begun Delivering Promised Latency Cuts

In his January 12 SpaceX update, Elon Musk said the biggest goal for Starlink from a technical standpoint is to get the mean latency below 20 ms. He expanded by saying that given the speed of light, 8 ms is the absolute minimum latency for a satellite at 550 km. He believes they can optimize terrestrial and inter-satellite links, and minimize queueing delays and dropped packets, to recude the the rest of the time to below 10 ms. more

The FCC Cyber Trust Label Gambit

Several weeks ago, the Federal Communications Commission (FCC) embarked on one of the most far-reaching regulatory gambits in its 90-year history. It is formally known as a Notice of Proposed Rulemaking in the matter of Cybersecurity Labeling for Internet of Things, Docket 23 -- 239. The FCC offers ICT product developers the use of its FCC trademarked cyber trust mark placed on their products in exchange for accepting open-ended Commission cybersecurity jurisdiction... more

A Peek Inside the FCC

I write a lot about the U.S. Federal Communications Commission (FCC), but I imagine a lot of folks don't realize the many functions the agency handles. Like any regulatory agency, the FCC staff and Commissioners have been tasked by Congress with a wide range of responsibilities. The public gets to hear from the FCC formally once each month ... more

IPv4 Prices: Supply and Demand in 2023

In early 2022 the discount that had been available for large blocks of IPv4 addresses disappeared. For the first time in years, /16 blocks and larger began to sell at an increasing premium. By Q2-2023, small and medium-sized blocks sold for a 30-35% discount to larger ones. At the same time, the tighter range of prices that had persisted for nearly a decade fractured and blocks traded in wide ranges throughout 2022 and the first half of 2023. more

The xz liblzma Vulnerability

On 29 March 2024, an announcement was posted notifying the world that the Open-Source Software (OSS) package "xz-utils," which includes the xz data compression program and a library of software routines called "liblzma" and which is present in most Linux distributions, had been compromised. The insertion of the compromised code was done by "Jia Tan", the official maintainer of the xz-utils package. more

The FCC Cyber Trust Label Gambit: Part II

Sixty years ago, Paul Baran and Sharla Boehm at The RAND Corporation released a seminal paper that would fundamentally reshape the cyber world forever more. Their paper, simply known as Memorandum RM -- 1303, described how specialized computers could be used to route digital communications among a distributed universe of other computers. It set the stage for a flood of endless developments that resulted in the interconnected world of everything, everywhere, all the time. more

A Multistakeholder Model if We Can Keep It: 25 Years of ICANN

I go back to the International Forum on the White Paper (IFWP). (Like Jeff, I was very young.) The Department of Commerce had just issued the White Paper, and there was a proposal that we pass control of the critical Internet identifiers to a new not-for-profit corporation with a bottom-up Multistakeholder way of making policy and an international board of directors. more

ICANN’s Inaction on NIS2 Tests the Effectiveness of the Multistakeholder Model

ICANN's response to the European Union's Network and Information Security Directive (NIS2) is a litmus test on whether its policy processes can address the needs of all stakeholders, instead of only satisfying the needs of the domain industry. Early indications from the ICANN Hamburg meeting point to another disappointment for law enforcement, cybersecurity professionals, and the many businesses seeking to reinstate WHOIS as required by NIS2. more

Notes from NANOG 89: Trust and Network Infrastructure

Trust is such a difficult concept in any context, and certainly, computer networks are no exception. How can you be assured that your network infrastructure is running on authentic platforms, both hardware and software and its operation has not been compromised in any way? more

Topics

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

Threat Intelligence

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days