The European Union's cloud computing strategy couldn't come at a better time as the region lags behind the rest of the world when it comes to cloud computing usage. The EU announced its cloud computing strategy last month and is optimistic it will create new jobs and help boost a struggling economy. An information campaign is necessary if the EU is to overturn the misunderstanding and general lack of knowledge about the cloud. more
DMARC is what one might call an emerging e-mail security scheme. It's emerging pretty fast, since many of the largest mail systems in the world have already implemented it, including Gmail, Hotmail/MSN/Outlook, Comcast, and Yahoo. DMARC lets a domain owner make assertions about mail that has their domain in the address on the 'From:' line. It lets the owner assert that mail will have a DKIM signature with the same domain, or an envelope return (bounce) address in the same domain that will pass SPF validation. more
A story... ZZZ Telemarketing (not a real name) is locked in a heated fight with their bitter rival, YYY Telemarketing (also not a real name), to win a very large lead generation contract with Customer X. Customer X has decided to run a test pitting the two companies against each other for a week to see who can generate the most leads. The ZZZ CEO has said to his staff that it is "do or die" for the company. If they fail to win the contract, they will have to shut down -- they need to do "whatever it takes" to win over YYY. A ZZZ staffer discovers that part of why YYY has consistently underbid them is because they are using SIP trunks to reduce their PSTN connection costs. But the staffer also discovers that YYY is using very cheap voice service providers who run over the public Internet with no security... more
Because domain names represent the online identity of individuals, businesses and other organizations, companies and organizations large and small have expressed increasing concern over reports of "domain name hijacking," in which perpetrators fraudulently transfer domain names by password theft or social engineering. The impact of these attacks can be significant, as hijackers are typically able to gain complete control of a victim's domain name - often for a significant period of time. more
OARC held a 2-day meeting in February, with presentations on various DNS topics. Here are some observations I picked up from the presentations in that meeting... In a world where every DNS name is DNSSEC-signed, and every DNS client validates all received DNS responses, we wouldn't necessarily have the problem of DNS spoofing. Even if we concede that universal use of DNSSEC is a long time off ... more
Recent court rulings hold ISPs accountable for failing to disconnect users accused of copyright infringement, sparking alarm across the industry. As record labels push for harsh penalties and ISPs warn of the potential for mass disconnections, the debate highlights the flaws of outdated copyright laws and raises critical questions about fairness, enforcement, and the future of internet access. more
I was looking at the End User License Agreement to which Skype wants people to assent. I noticed the following odd provision (Section 3.2.4): You hereby grant to Skype a non-exclusive, worldwide, perpetual, irrevocable, royalty-free, sublicensable and transferable licence to Use the Content in any media in connection with the Skype Software, the Products and the Skype Website. more
The ICANN Board will vote today on a new registry service put forward by PIR for .org which is its attempt to solve the domain tasting issue. It takes the form of an amendment [pdf] to the .org contract and enables PIR to charge five cents per domain "when the number of such deleted registrations is in excess of 90 per cent of the total number of initial registrations"... more
With cybercrime on the rise, companies in 2021 have experienced increased ransomware attacks, business email compromise (BEC), phishing attacks, supply chain attacks, and online brand and trademark abuse. While domain cyber risk is rising, the level of action being taken by Forbes Global 2000 companies to improve their domain security posture has remained unchanged, leaving these companies exposed to even more risk. The risk of not addressing your domain security can be catastrophic. more
Unlike ICANN, the National Telecommunications and Information Administration (NTIA) responded graciously, promptly and substantively to inquiries from the Center for Regulatory Effectiveness (CRE) regarding governance of the internet. CRE sent a letter to NTIA in mid-March asking about public access to documents prepared by ICANN under Memorandum of Understanding (MOU) with NTIA. NTIA provided a quick and clear response to CRE's questions. NTIA also reiterated its commitment to achieving transparency and accountability in ICANN's processes. NTIA's response to CRE, although clear and comprehensive, raised a number of important questions about ICANN and their governance of the internet. more
In this two-part series article, Andrew McLaughlin takes a critical look at the recently reported study, Public Participation in ICANN, by John Palfrey, Clifford Chen, Sam Hwang, and Noah Eisenkraft at the Berkman Center for Internet & Society at Harvard Law School..."The study's presentation and analysis of data contain much of interest, and much that could assist ICANN (and other policy-making bodies) in improving its use and management of online public forums. But the study's value is diminished by two rather fundamental shortcomings: (1) its misapprehension of both the theory and the practice of ICANN's policy-development process, and (2) the sizeable gap between the broad scope of the study's conclusions and the very narrow -- indeed, myopic -- focus of the analysis from which they are derived. Simply put, the study scrutinizes a small and misleading corner of ICANN (namely, its online public comment forums) and leaps to a sweeping (and, in my view, unwarranted) conclusion." more
In today's interconnected world, your business's online identity is increasingly more vulnerable than ever. With the rapid advancement of AI and 6G technologies, cyber threats are evolving at an alarming rate, making it critical to protect your brand's digital presence. How can businesses proactively safeguard their online identity in this changing landscape? more
Well, I have remained silent on this issue for now -- mainly because of conflicts. I was one of a few members of the technical advisory group asked by VeriSign to look at Site Finder and ask the questions -- what does it add, what does it break, and how can we fix anything it breaks? The scope of the group was unlimited by any VeriSign edict and the members were of impeccable individual credentials. This group has now completed its work so I feel able to comment. more
Today a key committee in the US Congress approved a resolution opposing United Nations "control over the Internet." While some in the Internet community have dismissed the bipartisan effort as mere political grandstanding, recent actions by some UN Member States show that lawmakers have good reason to be worried. Last month, UN voting member Ethiopia made it a crime -- punishable by 15 years in prison - to make calls over the Internet. more
I regularly bring this issue forward, similar to the discussion in relation to the structural separation of the fixed networks, which I began just over a decade ago. What we are seeing in the mobile industry is an infrastructure and a spectrum crunch. The amount of spectrum needed to satisfy people's demand from mobile phones, tablets and soon a range of other smart devices is limitless. Mobile carriers are scrambling for spectrum... more
Sponsored byDNIB.com
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byCSC
Sponsored byRadix
Sponsored byVerisign