Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Homeland Security Department Was Warned About DNSSEC Key Ownership and Trust Issues

The Internet Governance Project has unearthed a consultancy report to the U.S. Department of Homeland Security (DHS) that makes it clear that the issue of root signing and DNSSEC key management has been recognized as a political issue within the US government for long time. more

Cross-Pollination in Cyberspace and the Internet Governance “Spaghetti-Ball”

In mid-May 2020, UN-Secretary General Antonio Guterres will present a "Roadmap for Digital Cooperation". This will be another milestone in the discussion on the future of cyberspace, pushed further forward by the UN High Level Panel on Digital Cooperation (HLP), co-chaired by Jack Ma (AliBaba) und Melinda Gates (Microsoft Foundation) The HLP Final Report presented five groups of recommendations. Discussion started during the 14th IGF in Berlin... more

A Serious Bug in the Similarity Check

A week ago, ICANN announced the latest delay in the New gTLD Program: the so-called "contention sets" will only be published March 1, 2013. The original deadline was July 2012, postponed serially in two-month intervals. The gTLD program is lost in confusing similarity. What went wrong? In order to determine which TLD applications are in contention, it is necessary to say which TLD strings are confusingly similar to one another. more

Chinese Hackers and Cyber Realpolitik

For many people the comments made by Michael Hayden, Former Director of the Central Intelligence Agency, at this week's Black Hat Technical Security Conference in Abu Dhabi may have been unsettling as he commented upon the state of Chinese cyber espionage. I appreciate the candor of his observations and the distinction he made between state-level motivations. In particular, his comment... more

Email Portability Approved by Knesset Committee

The email portability bill has just been approved by the Knesset's committee for legislation, sending it on its way for the full legislation process of the Israeli parliament. While many users own a free email account, many in Israel still make use of their ISP's email service. According to this proposed bill, when a client transfers to a different ISP the email address will optionally be his to take along, "just like" mobile providers do today with phone numbers. more

LTE Insufficient from the Start, Boingo IPO Propitious

The trouble with planning way ahead is that the world changes before you execute. The major wireless carriers have been planning their 4th generation LTE (Long Term Evolution) rollouts for a long time -- that's how they do things. Now, even as Verizon Wireless is doing an aggressive rollout of LTE, it's becoming clear that LTE networks will not be able to slake the data thirst of a world full of smart phones and tablets. Whoops. more

Hong Kong is the Fastest Internet Region in the World

In Akamai Technologies' "State of the Internet" report for Q4 2010 Hong Kong (as a region/country) was identified as the market with the fastest average peak internet connection speed in the world. Hong Kong fixed line users can access the internet with an average peak speed of 37.9Mb/s, ahead of South Korea at 32.3Mb/s, Romania at 31.7Mb/s and Japan at 30.5Mb/s. more

Domain Name Registries Must Do More to Protect Highly-Trafficked Domains

With the recent attacks against high-profile New Zealand domain names including Coca-Cola.co.nz and F-Secure.co.nz, fingers are naturally pointing to Domainz, the registrar of record for these domains, as the party responsible for this lapse in security. While domain name registrars certainly need to ensure the security and stability of their systems, domain name registries must also step up and take responsibility for mitigating risks posed by hackers... more

Rent vs. Buy: The Driver of Economics

We the people like to own stuff and not pay rent to use it (BTW, rent includes taxes but that's another story). They the oligarchs like to own the stuff and charge us rent to use it. The rise of a middle class has historically meant the rise of a property-owning class. The underclass pays exorbitant rents. The telecommunications world -- or at least the US part of it -- is a battle of rent vs. buy. Economics says that ownership or rentership is all based on access to capital. Certainly capital is a huge part of the equation -- can you spell "home loan"?; but it's not the whole story... more

Software Insecurity: The Problem with the White House Cybersecurity Proposals

The White House has announced a new proposal to fix cybersecurity. Unfortunately, the positive effects will be minor at best; the real issue is not addressed. This is a serious missed opportunity by the Obama adminstration; it will expend a lot of political capital, to no real effect... The proposals focus on two things: improvements to the Computer Fraud and Abuse Act and provisions intended to encourage information sharing. At most, these will help at the margins; they'll do little to fix the underlying problems. more

DNSSEC is But One Link in the Security Chain

As the implementation of DNSSEC continues to gather momentum and with a number of ccTLDs, and the '.org' gTLD having deployed it into their production systems, I think it is worth pausing to take a look at the entire DNSSEC situation. Whilst it is absolutely clear that DNSSEC is a significant step forward in terms of securing the DNS, it is but one link in the security chain and is therefore not, in itself, a comprehensive solution to fully securing the DNS system. more

DNSSEC and DNS over TLS

The APNIC Blog has recently published a very interesting article by Willem Toorop of NLnet Labs on the relationship between Security Extensions for the DNS (DNSSEC) and DNS over Transport Layer Security. Willem is probably being deliberately provocative in claiming that "DoT could realistically become a viable replacement for DNSSEC." If provoking a reaction was indeed Willem's intention, then he has succeeded for me, as it has prompted this reaction. more

European Privacy Authorities Object to ICANN Whois Proposals

In response to a letter from ICANN's Noncommercial Users Constituency (NCUC) to data protection authorities concerning overreaching requests of law enforcement agencies in ICANN's ongoing Registrar Accreditation Agreement negotiations, the Article 29 Data Protection Working Party has written the ICANN Board. more

Will the Cloud Kill Telecom Vendors?

There are many big questions in telecom these days, and this is one that's on my mind right now. Over the past few months, I've participated in events or briefed with leading vendors in our space, namely Avaya, ShoreTel, BroadSoft, Aastra, Metaswitch, Mitel, Interactive Intelligence, and this week Cisco. Every analyst has their own core circle of vendors they stay close to, but I'd say that's a pretty fair representation of who's driving telecom. To varying degrees, all of these vendors have a cloud story, and the more I hear it, the more I start to wonder what it really means. more

97% of All Global 2000 Companies at Risk from SAD DNS Attack

There is a new threat in town known as "SAD DNS" that allows attackers to redirect traffic, putting companies at risk of phishing, data breach, reputation damage, and revenue loss. What is SAD DNS? No, it isn't the domain name system (DNS) feeling moody, but an acronym for a new-found threat -- "Side-channel AttackeD DNS" discovered by researchers that could revive DNS cache poisoning attacks. more

Topics

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

DNS Security

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days