Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Is Africa Ready for a dotAfrica gTLD Future?

It's approximately 2 months to go before the grand application process for the new gTLDs begins, ICANN the international internet body made a revolutionary announcement in June that is going to change the entire internet namespace. With the current 21 gTLDs, the world is bracing for a surge of close to 500 new applications. Among the domains of my interest is the .Africa gTLD. more

Where Do You Register New Domain Names?

Most users who already use websites have heard about domain names and they know what they are. Although .COM domains are already very popular, they are no longer as appealing as they once were, because they don't mean anything as such and all of the cool, short names have long since been registered. In 2014, this will change with the emerging new domain names. I like to think that it is possible that, with the increased communications that exists around new gTLD and the fact that many of these new domain names actually mean something, people will start paying more attention. more

A Breakdown of the Domain Industry 2024

As we advance into 2024, the global landscape remains etched with the marks of a tumultuous previous year. The world economy grappled with challenges on multiple fronts in 2023, from surging inflation rates across significant economies to geopolitical conflicts and instability fostering a climate of uncertainty. Compounded by ongoing disruptions in global supply chains, these factors painted a rather somber picture of the economic outlook for many sectors. more

Alternative Insights on Article 28 of the NIS2 Directive

On June 9 CircleID published an insightful article by Thomas Rickert entitled "Demystifying Art 28 NIS2." In that piece Thomas set forth two alternative interpretations of Article 28(6) of NIS2, and argued that TLD registries should not be required to maintain a separate database of the registrant data under NIS2. In my view, Thomas' approach is inconsistent with the remainder of Article 28, and would not achieve the goals of NIS2 to improve cybersecurity across the EU member states. more

Quelle Suprise! ICANN’s Accountability Plan Gives ICANN Board Total Control

After a long await, ICANN's senior management finally released its plan for "Enhancing Accountability" at the private California corporation that makes global Internet domain name policy. Unfortunately, the accountability deficit crisis created by ICANN's longstanding policy of purely "self-policing" with no meaningful external accountability mechanisms will not be solved by this weak plan for more self-policing. more

The Trouble With 6to4

In the transition from IPv4 to IPv6, the preferred solution for network endpoints is to have both native IPv4 and IPv6 connectivity (also called dual-stack connectivity). If a site cannot get native IPv6 connectivity, however, the IPv4 network endpoints can choose from a number of conversion technologies to connect to the IPv6 Internet. The most commonly used conversion mechanisms are 6to4, Teredo and tunnel-brokers. At recent RIPE meetings there have been claims that 6to4 connectivity is quite often broken. We were interested to find out how broken it really is. more

Scarcity of IPv4 Addresses

My friend Kurtis writes in his blog some points he has been thinking of while discussing "when we run out of IPv4 addresses". In reality, as he points out so well, we will not run out. It will be harder to get addresses. It is also the case that unfortunately people that push for IPv6 claim IPv6 will solve all different kinds of problem. Possibly also the starvation problems in the world... more

Afilias’ Cynical Attempt to Secure a Windfall at Community Expense

On Friday, October 28, Afilias issued a public statement urging the Internet Corporation for Assigned Names and Numbers (ICANN) to nullify the results of its July 27, 2016 public auction for the .web new generic top level domain (gTLD) -- in which Nu Dotco, LLC (NDC) submitted the highest bid for .web -- and disqualify NDC from participation in the .web contention. The real issue here is whether ICANN should enforce the results of a fair and competitive public auction... more

IPv6 Security Myth #2: IPv6 Has Security Designed In

Today we continue with part 2 of the 10 part series on IPv6 Security Myths by debunking one of the myths I overhear people propagating out loud far too much: That you don't need to worry about security because IPv6 has it built into the protocol. In this post, we'll explore several of the reasons that this is in fact a myth and look at some harsh realities surrounding IPv6 security. more

2014 Domain Name Year in Review

It's hard to believe that another year has come and gone and that I'm now publishing my 5th Annual Domain Name Year in Review. It's sort of fun to look back 5 years ago to see how much things have changed, especially as focus has shifted to issues related to the launch and use of new gTLDs. Of course, much has stayed the same too. Concerns related to domain name security and domain portfolio management are still important. more

IPv6 Security Myth #4: IPv6 Networks are Too Big to Scan

Here we are, all the way up to Myth #4! That makes this the 4th installment of our 10 part series on the top IPv6 Security Myths. This myth is one of my favorite myths to bust when speaking with folks around the world. The reason for that is how many otherwise well-informed and highly experienced engineers, and others, hold this myth as truth. It's understandable, really. more

Analysis of the IDN New gTLD Applications

There has been a lot of excitement since ICANN revealed the list of 1930 applications for new gTLD yesterday at an event in London yesterday. Even some of the strongest opponents of the ICANN's new gTLD program have acknowledged there is a case to open up new gTLDs for Internationalized Domain Names (IDNs). I am going to focus here on the analysis of the IDN applicants. more

The Value of Trust in 2007

Applications and devices like cell phones, email, search engines, and automated programs handle the error messages differently; it would be naive for VeriSign to think only humans with browsers rely on DNS. When a user enters a non-exist domain name on their cell phone the DNS error message would prevent downloading. Now cell phones download VeriSign's SiteFinder webpage and Service Providers bill the cell phone user for that extra usage. SPAM prevention programs also rely on this error message to check to see if the domain is real. more

IPv6 Security Myth #3: No IPv6 NAT Means Less Security

We're back again with part 3 in this 10 part series that seeks to bust 10 of the most common IPv6 security myths. Today's myth is a doozy. This is the only myth on our list that I have seen folks raise their voices over. For whatever reason, Network Address Translation (NAT) seems to be a polarizing force in the networking world. It also plays a role in differentiating IPv4 from IPv6. more

UDRP Failure Endangers Consumers

Yesterday I participated in a panel at the International Consumer Product Safety Conference sponsored by the International Consumer Product Health and Safety Organization (ICPHSO) held at the European Commission in Brussels Belgium. This conference brings together the global community of product safety engineers, manufacturers, retailers, regulators, inspectors, and counterfeiting investigators. The role of online fraud and illicit product traffic is clearly one of the conference priorities. more

Topics

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

DNS Security

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days