Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

ICANN’s Weak Accountability Remains a Problem

The JPA is dead, and in its place is the Affirmation of Commitments. Much debated, this change is anticipated to bring more global participation into ICANN's governance. Increased globalization may turn out to be beneficial for the Internet community, if it helps to shore up ICANN's institutional weaknesses. But the Affirmation leaves important questions unanswered... more

How Aruba is Using Racing Sponsorship to Make Itself a Premium Brand

Sitting in the Aruba hospitality at the Italian round of the Superbike World Championship in Imola, CEO Stefano Cecconi exudes passion. The love he has for motorcycles in general, and racing in particular, is evident. Less so is the rational behind Aruba's multi-million-euro-a-year spend to be the title sponsor for the factory Ducati World Superbike team. For Internet industry onlookers at least. more

TeleGeography’s Interactive Submarine Cable Map Is a Fun and Fascinating View Into Infrastructure

Ever want to know where all the submarine cables are that provide part of the physical infrastructure of the Internet? Or which cities in the world have the most connectivity via submarine cables? (or which regions might be single points of failure?) In doing some research I stumbled across this excellent site from the folks at TeleGeography... It is a very well done and captivating (to me, anyway) view into where all the current and planned submarine cables are located. more

Institutionalizing Consumer Trust and Public Interest at ICANN

For an organization where people argue for hours over arcane minutiae, it's remarkable that virtually everyone agrees that ICANN should serve the "global public interest" and build "consumer trust" in the Internet. Although it's only three pages long, ICANN's Affirmation of Commitments (AoC) cites "public interest" five times and "consumer trust" eight times. So at the ICANN meeting today in Cartagena, Colombia, a group of participants explored ways to "institutionalize" these concepts within the organization. more

The Story of Conficker and the Industry Response

On November 2, 2009, Microsoft released its seventh edition of the Security and Intelligence Report (SIR). The SIR provides an in-depth perspective on the changing threat landscape including software vulnerability disclosures and exploits, malicious software (malware), and potentially unwanted software. Using data derived from hundreds of millions of Windows computers, and some of the busiest online services on the Internet, this report also provides a detailed analysis of the threat landscape and the changing face of threats and countermeasures and includes updated data on privacy and breach notifications. The following is an excerpt from the SIR, pp 29-32, about the Conficker worm and the industry response that showed an incredible amount of collaboration across vendors. more

Don’t Make Us Treat Our Customers Like Criminals!

Crime, fraud, scams etc., they're all very bad things. They're also not going to go away anytime soon. As a domain name registrar and hosting provider we're constantly "at risk", as we sell a lot of services that are both cost-effective and also give criminals the tools they need to attack 3rd parties. Again, this isn't exactly news. We've always taken a very pro-active approach to dealing with criminal activity and network abuse... But recently I've been losing sleep. more

Household Botnet Infections

Pinning down the number of infected computers is really, really hard. I'd go as far as saying it's practically impossible to calculate, let alone observe. Still, that's not going to stop people from attempting to guess or extrapolate from their own observations. Over the years I've heard "reliable" numbers ranging from 10% through to 60% -- and I don't trust any of them. There's a whole gaggle of reasons why the numbers being thrown out to the public are inaccurate and should ideally be interpreted with a lot of skepticism by any right-minded folks. more

A Tempest in a Libyan Teapot

The .LY domain is Libya, and their government recently cancelled the registration of the short and snappy VB.LY, provoking great gnashing of teeth. If you direct your attention to the address bar above this page, you'll note that it's at JL.LY, equally short and snappy. The .LY registry started allowing two letter second-level domains last year, and there was a quiet land rush. Now they restrict those domains to people actually in Libya, but say they'll let us keep the ones we have. How concerned am I that they'll take my domain away, too? more

If You Build It, They Will Come.

Only two years after signing the DNS root zone, the powerful lure of a secure global infrastructure for data distribution is starting to reveal itself. It is illustrated clearly by two proposed technical standardizations that seek to leverage secure DNS. To some degree these developments highlight the strength of DNS institutions and how they might fill gaps elsewhere in the Internet's governance. But an increasing reliance upon and concentration of power in the DNS also makes getting its global governance correct even more important. more

The Browser Is the OS (Thanks to Firefox 3.5, Chrome 2, Safari 4)

Almost a year ago I wrote about Google Chrome: Cloud Operating Environment and [re]wrote the Google Chrome Wikipedia article, discussing the ways in which Google was changing the game through new and innovative features... Similar features were quickly adopted by competitors including Opera (which Chrome quickly overtook at ~2%) and Firefox (which still has an order of magnitude more users at ~20-25%). more

Considerations on the High-Level Panel’s “Internet Governance Forum Plus” Model

The Fourteenth Annual Meeting of the Internet Governance Forum (IGF) will convene in Berlin three weeks from tomorrow. One of the highlights of the meeting could be the main session on Internet Governance and Digital Cooperation that is to be held on Day 1, 26 November 2019. The session is to consider some of the recommendations contained in the June report from the UN Secretary-General's High-level Panel on Digital Cooperation, most notably the panel's proposal to revamp the IGF... more

Registering for the Registrar Rodeo: A Note to the New gTLDs

Thank goodness for Monday's new gTLD draw!!! To date the process has been more of an intellectual exercise in marketing, technology, and strategic game thinking - it was getting a little boring. A business needs to see regular 'wins' to keep momentum and stay motivated. The presumptive lineup of new gTLDs has now been established which has given most applicants (save those poor souls looking at 2015 as their launch year) a clear view of the starting gate. more

SIP, the Holy Grail of VoIP World

For many in the Voice over IP world, Session Initiation Protocol (SIP) is the holy grail. Once it is accepted by every vendor and manufacturer, it will enable every IP-based device and application to communicate with one another. But for now it remains still a bit of an enigma that raises a large number of questions for everyone. TechTarget offers a VoIP SIP fundamentals guide discussing some of the basics of SIP -- its vulnerabilities, testing and hardware. more

Brands Should Not Ignore the Security Benefits of New gTLDs

If one thing has become clear from recent commentary on ICANN's new top-level domain program, it's that there's a dramatic lack of understanding about some of the benefits of owning your own TLD - especially as it relates to security. Many brand owners - especially those with luxury brands - could realize immediate benefits from reduced counterfeiting and greater brand trust with a "dot Brand." more

New Report on “State of DNSSEC Deployment 2016” Shows Continued Growth

Did you know that over 50% of .CZ domains are now signed with DNS Security Extensions (DNSSEC)? Or that over 2.5 million .NL domains and almost 1 million .BR domains are now DNSSEC-signed? Were you aware that around 80% of DNS clients are now requesting DNSSEC signatures in their DNS queries? And did you know that over 100,000 email domains are using DNSSEC and DANE to enable secure email between servers? more

Topics

DNS

Sponsored byDNIB.com

Threat Intelligence

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days