Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

An Internet Security Operations Viewpoint of IGF

The Internet Governance Forum (IGF) is an annual UN conference on Internet governance which was held this year in Rio de Janeiro, Brazil. The topics discussed range from human rights online to providing Internet access in developing countries. A somewhat secondary topic of conversation is Internet security and cyber-crime mostly limited to policy and legislative efforts. Techies and Internet security industry don't have much to do there, but I have a few updates for us from the conference. more

Fighting Over the Scraps from ICANN’s Table

I've finally recovered from another ICANN meeting, frustrated as ever. 700 or so people flew halfway around the world to hear canned presentations, dueling-monologue public form sessions, and resolutions that left major issues unresolved, and to gripe in the hallways about how little was being done. more

ICANN’s Picture of Itself

ICANN has released its draft new budget. The document gives us a good look at how ICANN sees itself. It's arguably an internally inconsistent view. ...This budget calls for ICANN to have almost 60 staff members by the end of the next fiscal year. Expenses under this budget are predicted to be twice those of last year ($16 million v. $8 million). more

Can We Get More Eyes on Britain’s Largest Scam “Watch List”?

The FCA has been naming and shaming financial scam domains for decades. Its "warning list" is probably one the most extensive databases of its kind. But does it do a good enough job of actually warning people? Let us begin with the FCA website, which would not exactly get full points for user-friendliness: locating the "watch list" is a task in and of itself, to say nothing of consulting and scrutinising it. more

Nom-Com Appoints Independent and Diverse Candidates to ICANN Leadership Positions

When 72 candidates vie for 8 positions, making tough choices are inevitable. ICANN's 2005 Nominating Committee (Nom-Com) on Friday announced the selection of a diverse and independent set of nominees for important roles in ICANN, including the Board of Directors, the Generic Names Supporting Organization (GNSO), the At-Large Advisory Council (ALAC) and the Country Code Names Supporting Organization (ccNSO). more

Carriers Skirting Rules on Network Neutrality vs. Free’s Innovative Network

From will they ever learn department, we are once again seeing attempts by incumbent carriers to skirt rules around network neutrality. They tried and failed with UBB. Now they are at it again with "speed boost" technologies. The two technologies at question are Verizon's "Turbo" service and Roger's "SpeedBoost". more

Internet Bifurcation: Will the US-China Digital Arm-Twisting Splinter the Open and Free Internet?

The Internet controversy between the US and China is escalating. The Trump Administration is fighting against Huawei, TikTok and We Chat. China is pushing back with new export regulations for Chinese IT technology. August 5, 2020 the US State Department launched a "Clean Network" initiative, aimed to remove Chinese digital corporations from the global supply chain in today's interconnected world. September 8, 2020 the Chinese Foreign Ministry replied with a "Data Security" initiative, aimed to enhance global cybersecurity in "Chinese colours." more

Verisign Will Help Strengthen Security With DNSSEC Algorithm Update

As part of Verisign's ongoing effort to make global internet infrastructure more secure, stable, and resilient, we will soon make an important technology update to how we protect the top-level domains (TLDs) we operate. The vast majority of internet users won't notice any difference, but the update will support enhanced security for several Verisign-operated TLDs and pave the way for broader adoption and the next era of Domain Name System (DNS) security measures. more

A Quick Primer on Internet Peering and Settlements

The business world today features many complex global service activities which involve multiple interconnected service providers. Customers normally expect to execute a single paid transaction with one service provider, but many service providers may assist in the delivery of the service. These contributory service providers seek compensation for their efforts from the initial provider. However, within a system of interdependent providers a service provider may undertake both roles of primary and contributory provider, depending on the context of each individual customer transaction. more

CMO Offers Fresh View on New gTLDs: “They’re a Channel, Not Just a Label”

Several years ago, I had a very interesting conversation with a talented marketing executive from Portland, Oregon who joined the DotGreen Community, Inc. Board of Directors. When I told him about the new gTLD program, which was then under development at ICANN, Dave Maddocks immediately understood the value of what new gTLDs would mean to all businesses that have an online location. more

Canada: Smart Regulation, Not De-regulation

Canada's CRTC isn't as dumb as U.S. regulators who are considering ruling that the law doesn't apply where the telcos oppose it. (Title II deregulation) Canada just decided wireless needs to follow the rules. In turn, the CRTC intends to make sure the rules are reasonable. Rather than saying "never any rules," they instead try to write sensible ones. more

A Layered Approach to IG: Cooperation or Crisis!

In an Internet governance agenda that treats diversity of addressing issues as the ultimate end at any cost, technology and its end-users are mere means, and much of the work that sustains the Internet is ignored entirely. As a nation, you are free to initiate different regulations, but when you start getting into the world of infrastructure, you are legislating far beyond the nation-state borders. more

It’s Not Paranoia if They Are Really After You!

In the latest development from the World Conference on International Telecommunications, a new "compromise proposal" has been leaked to wcitleaks.org. This proposal is certainly no compromise, as it not only is a bald faced power grab by the sponsors (Russia, UAE, China, Saudi Arabia, Algeria, Sudan at this point), but shows a stunning lack of comprehension of how the Internet works and how it is currently governed. It also shows that the coalition of Civil Society groups and private sector organisations that have focused on WCIT have been correct all along.  more

Court Finds Anti-Malware Provider Immune Under CDA for Calling Competitor’s Product Security Threat

Plaintiff anti-malware software provider sued defendant -- who also provides software that protects internet users from malware, adware etc. -- bringing claims for false advertising under the Section 43(a) of Lanham Act, as well as other business torts. Plaintiff claimed that defendant wrongfully revised its software's criteria to identify plaintiff's software as a security threat when, according to plaintiff, its software is "legitimate" and posed no threat to users' computers. more

New TLDs For Dummies (Sort of)

There's been a lot of media attention on the new Top-Level Domain (TLD) process in the last few days, which is a good thing. Unfortunately most of it is badly written, misleading or simply misinformed. Let's look at the reality. To start with, there are currently 20 gTLDs i.e. "global" Top-Level Domains (extensions)... more

Topics

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

DNS Security

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days