Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Who Are the Major New gTLD Applicants and… (Part Six: Starting Dot)

Starting Dot ("SD") is a French new gTLD applicant which applied for five strings: .ARCHI, .BIO, .DESIGN, (which has been withdrawn) .IMMO and .SKI. It is the only French applicant to have applied for several open new gTLDs. Some French brands have applied too but as closed Top-Level Domains... While Starting Dot may be one of the smaller portfolio applicants, there is a considerable difference here in the way their projects are handled when compared to some of the larger applicants. more

Chinese Internet Research Conference: Getting beyond “Iron Curtain 2.0”

At last week's Chinese Internet Research Conference, much discussion of the "myths and realities" of the Chinese Internet revolved around images, metaphors, and paradigms. In his award-winning paper titled The Great Firewall as Iron Curtain 2.0, UPenn PhD Student Lokman Tsui argued that "our use of the Great Firewall metaphor leads to blind spots that obscure and limit our understanding of internet censorship in the People's Republic." more

Registration Patterns of Deceptive Domains

A key requirement for a bad actor wanting to launch a brand attack is the registration of a carefully chosen domain name. The most convincing infringements frequently use a domain name that's deceptively similar to that of the official site of the target brand. This allows a variety of attacks to be executed, including phishing attacks... more

Chuck Norris Botnet and Broadband Routers

Last week Czech researchers released information on a new worm which exploits CPE devices (broadband routers) by means such as default passwords, constructing a large DDoS botnet. Today this story hit international news... The spread of insecure broadband modems (DSL and Cable) is extremely wide-spread, with numerous ISPs, large and small, whose entire (read significant portions of) broadband population is vulnerable. more

ICANN New gTLD Program SWOT Analysis: WEAKNESSES (Part 2)

The SWOT analysis (alternatively SWOT Matrix) is a structured planning method used to evaluate the Strengths, Weaknesses, Opportunities, and Threats involved in a project or in a business venture. The following is an attempt to apply the SWOT Analysis to ICANN's new gTLD program. more

Domain Pulse 2008: Internet Governance the Focus of Day One

Around 350 attendees came from Russia in the east to Ireland in the west, as well as a few people from elsewhere around the globe, to attend Domain Pulse 2008 in Vienna on February 21 and 22. Day one's focus was internet governance. The future of the DNS was one of the key issues addressed by Michael Nelson of Georgetown University in Washington DC, with domain names becoming less important, but their numbers still increasing, as online access by a myriad of devices skyrockets connect -- everything from the television, refrigerator, washing machine, pets, sprinkler systems and cars. more

Google as DNS, Wikileaks as PoC

Wikileaks is still accessible -- via Google. Does that change anything? For many Internet users IP addresses as well as domain names are completely transparent. Further, Google (and other search engines) and often the first stop when these users wants to find a service, or a web site. Thus, many of us discussed over the years the eventual viability of Google (... and other search engines) as "DNS" (note the "'s). Now, don't jump at my throat quite yet... more

Government Regulation of Cybersecurity: Partnership (or Power Grab) in the Making?

A cybersecurity bill introduced in the U.S. Senate on April 1st, 2009 would give the United States federal government extraordinary power over private sector Internet services, applications and software. This proposed legislation is a direct result of a review ordered by the Obama administration into government policies and processes for defending against Internet-born attack. The focus of the bill, according to a summary released by the sponsoring senators, is on establishing a new partnership between the public and private sectors in a joint effort to bolster Internet security... more

NTIA Says Cromnibus Bars IANA Transition During Current Contract Term

The Congressional Internet Caucus held its 15th annual State of the Net conference today at The Newseum in Washington, DC. This is traditionally a start the new year networking and information update day for the capital's technology policy set. Immediately following the lunch break, at a session titled "Internet Functions in Transition: Is the US and the World Ready?", NTIA head Lawrence Strickling provided the first official Obama Administration reaction... more

Say No to WIPO’s Proposal to Amend the PDDRP to Create New Law

A number of comments to ICANN's proposed Post Delegation Dispute Resolution Process for new gTLD Registry Operators support a proposal by the World Intellectual Property Organization (WIPO) to hold a registry operator accountable for trademark infringement that occurs within a TLD if it "knowingly permitted, or could not have reasonably been unaware of" infringing domain names within the TLD. more

The Cycle of E-Mail Security

Stepping back from the DMARC arguments, it occurs to me that there is a predictable cycle with every new e-mail security technology... Someone invents a new way to make e-mail more secure, call it SPF or DKIM or DMARC or (this month's mini-fiasco) PGP in DANE. Each scheme has a model of the way that mail works. For some subset of e-mail, the model works great, for other mail it works less great. more

7 Tips to Boost BYOD Security

The bring-your-own-device (BYOD) trend continues to make corporate inroads. According to Security Intelligence, more than 60 percent of enterprises now allow or "tolerate" employee mobile device use in the workplace. But companies still have significant security concerns, especially when it comes to the specter of lost data. Here are seven tips to boost BYOD security in 2015. more

Google Bows to Pressure on Closed Generics

The debate surrounding "closed generics", which has been covered several times in the past, has attracted a lot of attention in recent weeks. At the centre of the debate were a number of new TLD applications from large companies including Google, Amazon and others. Google had stated that they planned to establish a number of domain extensions and operate them as "walled gardens". At the ICANN public meeting in Toronto Google attempted to defend their plans and their position until today was unchanged. more

The Myth of Population Density and the High Cost of Broadband

One of the enduring myths that is used by apologists for incumbent broadband operators as to the high cost of broadband in Canada and the US is our low population density.
Since Canada and the US have low population density compared to The Netherlands or South Korea, they argue that therefore the cost of delivering broadband will be significantly higher because of the much greater distances that need to be covered. more

Cloud Security Hinges on IP Addressing

In the first part of this trilogy, I discussed the importance of automatically provisioned second generation DNS in connection with Software Defined Networking (SDN) and Software Defined Data Centre (SDDC). In the second post, I talked about IP addressing, private enterprise networks, and how DHCP does not meet the requirements of multitenant Infrastructure-as-a-Service (IaaS) cloud environments. I will now wrap up this trilogy by putting these two thesis into real-life context. more

Topics

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

DNS Security

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days