Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Google Wave: Good News or Bad News for Carriers?

The recent launch of Google Wave generated a lot of attention, and for good reason. It's recently crossed my path in a few different settings, and while the news is still fresh, there is a lot here for service providers to be thinking about. At a high level, Wave is Google's entry into the real time collaboration space, and being Web-based, is poised to disrupt the status quo, not just for vendors, but service providers as well. more

SIEM Alternatives; How Does OpenXDR Make Traditional SIEM Obsolete?

OpenXDR is one of the most cost-effective SIEM alternatives that help businesses detect and mitigate threats within hectic modern architectures. A single cyber incident impacts every aspect of a business -- from system downtime, revenue losses, and reputation damage to disrupted operations. more

A True Final Ultimate Solution to the Spam Problem?

A common acronym in spam-fighting is FUSSP -- Final Ultimate Solution to the Spam Problem. It's used (usually derisively) to describe the latest proposed scheme to end spam once and for all. Usually these schemes are based on false assumptions or have already been tried with no results. This time - be still, my beating heart - it looks like some researchers at the University of California might really be on to something. more

The Path Towards Centralization of Internet Governance Under UN: Part 3

This essay is the third of a three-part series, written by Anonymous, and published by the Publius Project of the Berkman Center for Internet and Society at Harvard University. It focuses on the steps of a possible roadmap for centralizing Internet governance under the United Nations. more

Partnerships Can Enhance Security in Connected Health and Beyond

Like the poetic prose of Bob Dylan, the reality of modern technology cannot be ignored: "the times they are a-changin'." Transitioning from the novelty of the Internet, society is embracing connected technology as the new digital frontier. Dominated by the Internet of Things ("IoT"), the future will be one of increased interconnection of wireless and computing devices in everyday objects, allowing these devices to send and receive personal data. IoT's limits appear boundless, extending from physical devices and home appliances to vehicles and medical implants. more

Networks - The Next Challenge in Digital Transformation

As digital transformation has been picking up momentum, leading analysts such as 451 Research have suggested that hybrid multi-clouds and automated DevOps will become key constituents powering enterprises in the new era. At the heart of these enabling technologies lies Lifecycle Service Orchestration (LSO) designed for near-autonomous application deployment across hybrid infrastructures consisting of traditional on-premise data centers and public clouds. more

Government Regulation of Cybersecurity: Partnership (or Power Grab) in the Making?

A cybersecurity bill introduced in the U.S. Senate on April 1st, 2009 would give the United States federal government extraordinary power over private sector Internet services, applications and software. This proposed legislation is a direct result of a review ordered by the Obama administration into government policies and processes for defending against Internet-born attack. The focus of the bill, according to a summary released by the sponsoring senators, is on establishing a new partnership between the public and private sectors in a joint effort to bolster Internet security... more

Minimum Disclosure: What Information Does a Name Server Need to Do Its Job?

Two principles in computer security that help bound the impact of a security compromise are the principle of least privilege and the principle of minimum disclosure or need-to-know. As described by Jerome Saltzer in a July 1974 Communications of the ACM article, Protection and the Control of Information Sharing in Multics, the principle of least privilege states, "Every program and every privileged user should operate using the least amount of privilege necessary to complete the job." more

ICANN vs Epag/Tucows: German Court Rules Against ICANN

German courts seem to be pretty fast, so instead of having to wait weeks or months to see how they'd rule, we've already got the answer. The German court in Bonn has ruled that EPAG (Tucows) is not obliged to collect extra contacts beyond the domain name registrant. The decision, naturally, is in German, but there is a translation into English that we can use to understand how the court arrived at this decision. more

The IPv4 Market: 2017 and Beyond

The IPv4 market has grown significantly in the last four years. It finished particularly strong in 2017, both in terms of the total volume of addresses traded and overall number of intra- and inter-RIR transactions in the ARIN region. Over the last four years, the steady and sometimes substantial growth in the number of transactions has been mostly attributable to a dramatic increase in small block trades of fewer than 4,000 addresses. more

Define “Spam”

In my consulting and working with clients, I rarely use the word spam. There are so many different definitions of spam, I have no way to know if my clients understand what I am saying, so I avoid the term as much as humanly possible. An example of some of the few definitions of spam I've seen used over the years... more

Are the LEOs Going to Disrupt the Telco Market?

We are getting closer to using alternative broadband solutions offered by international companies. Local telecommunication entities will, in this respect, be relegated to resellers. The reality of accessing low Earth-orbiting satellite (LEO) services is now clearly on the horizon. Most of the telcos and governments are not prepared for the potential shock this might cause to the structure of local telecommunications markets. more

The End of Net Neutrality Regulation COULD Mean the End of Last-Mile Oligopolies

Landline networks like the old phone system and the new(er) cable systems do lend themselves to monopoly or at least duopoly outcomes. Building these networks is both very expensive and requires myriad government approvals. Once a system is in place, it is hard for anyone to raise the capital to duplicate it. Even a network of wireless towers is hard to compete with. more

The Impact of Rising Sea Level on Internet Infrastructure

A recent study predicts that rising sea level might result in as much as 4,067 miles of fiber conduit being under water and 1,101 nodes (data centers, Internet exchanges, cable landing points, etc.) surrounded by water in U. S. coastal cities in 15 years. Paul Barford, professor of computer science at the University of Wisconsin, and his colleagues have been compiling data on the physical Internet and making it available to the research community at the Internet Atlas Web portal since 2011. more

Islamic TLDs and the Challenge of Good Governance

As governments ask themselves whether they should not be the only ones in charge, and everyone else is more determined than ever to stay involved, Internet governance is now a front-page topic. But away from the theoretical debates about which model is best, one real-life situation may end up looking strangely like a vindication of the multi-stakeholder model by governmental organisations. The situation in question is that of Islam and Halal. Two applications that look like they are caught in a kind of new gTLD program groundhog day. more

Topics

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Threat Intelligence

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days