Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Leveraging Trademark Data to Drive Domain Name Strategy

For years, corporate domain name portfolio managers have struggled with determining whether or not their portfolios were the "right" size. Managers of mature domain name portfolios have often felt that their portfolios were bloated, containing domains that were no longer needed. Conversely, domain managers of newer portfolios have sometimes known that gaps existed. Regardless, the question remains -- just how many domains should a corporate portfolio contain? more

ITU’s Landmark Decisions

The ITU, through its Council acting as the executive body of the Member States, made a "landmark decision" to make available to the public "the main [WCIT] conference preparatory document" and to establish a publicly accessible page "where all stakeholders can express their opinions" on the preparatory document or other WCIT-related matters. more

Growth in IPv6-Capable DNS Infrastructure

In our last post on CircleID we showed encouraging growth in the number of IPv6-enabled networks. But announcing an IPv6 prefix is only one of the first steps a network operator should take when deploying IPv6. For a full IPv6 deployment, IPv6 needs to be enabled on network infrastructure and made available to end users. One key piece of infrastructure for which we can measure IPv6 capabilities are DNS resolvers. more

Managing Internet as a Shared Resource: Reasonable Technical Constraints?

The internet is a shared resource. Different access providers begin mixing traffic at different places, but sooner or later, my internet gets mixed into yours. The Canadian Association of Internet Providers (CAIP) application to the Canadian Radio-television and
Telecommunications Commission (CRTC) seems to acknowledge this shared nature with its reference (at paragraph 50 of its application) to the description of the Gateway Access Service its members resell, a description complete with a graphic of a cloud -- a sign that the resource is being shared... more

Ending Cyber-Hubris

Hurricane Katrina will lead the endless finger pointing about what should have been done to strengthen the levees before the storm. However, as a former senior FEMA official under the Clinton Administration explained, "There's only two kinds of levees. Ones that have failed and those that will fail." The same is true for cyber-levees.  more

The Dubai Debacle: Does It Matter?

The second phase of the Dubai Debacle is now well underway. The first of the ITU-T bodies, the World Telecommunication Standardization Assembly (WTSA) finished its ten day meeting. The second body, the World Conference on International Communication (WCIT) completed its second day. WTSA shapes the ITU T organization and detailed agenda, while the WCIT gives it a treaty-based construct with regulatory mandates. WTSAs occur every four years; WCITs every twenty-five - although there is a proposal to hold them more frequently. more

Should You Whitelist Your Vulnerability Scanning Service Provider?

Unlike consultant-led penetration testing, periodic or continual vulnerability scanning programs have to operate harmoniously with a corporation's perimeter defenses. Firewalls, intrusion prevention systems, web proxies, dynamic malware analysis systems, and even content delivery networks, are deployed to protect against the continuous probes and exploit attempts of remote adversaries -- yet they need to ignore (or at least not escalate) similar probes and tests being launched by the managed security service providers an organization has employed to identify and alert upon any new vulnerabilities within the infrastructure or applications that are to be protected. more

Another Free Registry Software Option

Google has recently announced the release of Nomulus, its free, open source registry software, triggering discussion of its impact on the industry. Afilias has over 15 years of experience in registry operations, and offers the following initial thoughts... First, free registry software is not new.CoCCA has offered this option for years, and TLDs such as .CX (Christmas Island) and .KI (Kiribati) use it. It is supported on a "best efforts" basis and appears to meet the limited needs of a few small operators. more

More Than Half Top-Level Domains Not Really on Top of IPv6

At the recent ISOC Asia conference in Kuala Lumpur a rather innocuous coffee break question was raised: could any one around the table name some of the major Top-Level Domains (TLDs) still delinquent in their IPv6 support? Nobody could answer on the spot but the question intrigued me. A logical place to start looking for an answer was ICANN. more

2020’s New Internet Success

Chinese technology policy is now more effective even than their naval posture in the South China Sea, and both are playing out in full sunshine. This success is not about the hardware pillar of Chinese tech policy, though: its focus is the structural approach China and, increasingly, other stakeholders are taking to global Internet Governance... Late in the Year of the Pig just gone, China's offer of a New Internet Protocol was chewed over in senior-level advisory groups of the International Telecommunication Union (ITU)... more

The Last Domain Name You’ll Ever Register

We read with interest the 20 Sept., 2011 article in The Hollywood Reporter. This confirmed that there is a lot of misinformation about the expansion of the domain name space circulating. Sadly, a creative opportunity is being seen as a threat by the most creative of industries. The arrival of an open playing field for .ANYTHING is not a threat, it is unquestionably a long awaited opportunity and solution to the murky waters of the .COM namespace.
The opportunity is the restoration of trust and authenticity. Trust and reputations have been eroded by cybersquatting, phishing and fraud that are endemic to the current naming system. more

Top 3 New Requirements to the TLD Evaluation Criteria and What They Mean for Applicants

Three sections of the redlined version of the Draft Evaluation Criteria for new Top-Level Domains (TLDs) caught my attention. It seems ICANN wants to ensure it has information to not only evaluate and score responses, but to conduct a post-launch analysis of the program's success in terms of expanded competition, consumer choice and trust. That additional information means more work by both the applicant and for ICANN. But it's a good move because pre-launch preparation and thought staves off mishaps and misfortunes later. more

A Free DNS Conformance Test Suite

The Domain Name System is now over 25 years old. Since the publication of RFCs 1034 and 1035 in 1987, there have been over 100 RFC documents published that extend and clarify the original DNS specs. Although the basic design of the DNS hasn't changed, its definition is now extremely complex, enough so that it's a challenging task to tell whether a DNS package correctly implements the specs. more

The Untold History of the First Cyber Moonshot

A dialogue between Michael Warner (Historian, United States Cyber Command) and Tony Rutkowski (Cybersecurity engineer, lawyer and historian). Michael is chairing a cyber history panel at the October biennial Symposium on Cryptologic History hosted by the National Security Agency; his panel will include discussion of the almost unknown key role of cryptologist Ruth Nelson leading a team in the 1980s in a major initiative to secure public internet infrastructure. more

The FttH Versus Cable Debate Misses the Point

I recently followed an interesting international discussion on FttH vs. cable. With the fiber to the home (FttH) debate hotting up, driven by the possibility of using FttH as the new infrastructure for the digital economy, the cable companies are putting up a stiff fight, both in Europe (Netherlands) and the USA, claiming FttH is not necessary, and that DOCSIS 3.0 can do the job just as well. In these debates the longer-term national interest is often disregarded. The debate is confined to the technology -- what it can and cannot do -- and it also concentrates on a rather short-term timeframe, say of the next five years. more

Topics

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days