Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

The Take Away from Global Payments Breach

Global Payments, an Atlanta-based payment card processing firm, announced yesterday that they had suffered "unauthorized access into a portion of its processing system". Sometime in early March they uncovered the attack, and there are some indications that the breach occurred between January 21st and February 25th of this year... There are a number of unverified reports that a New York City street gang with Central American ties took control of "an administrative account that was not protected sufficiently". more

A Cool Simulation of SpaceX’s Revised Satellite Broadband Plan

On November 15, the FCC approved a revision to the plan for Starlink, SpaceX's forthcoming broadband satellite service. The new plan reduces the number of satellites from 4,525 to 4,409 and lowers the altitude of the phase-1 satellites from 1,100 to 550 km. Mark Handley, a professor at University College London, has created videos based on simulations he ran of both the original and revised phase 1 plans. more

FISMA Failings: Could EPA’s IT Defense Deficiencies Silence the Agency?

The possibility of unauthorized access to EPA information raises an array of concerns since EPA-held data includes various types of Confidential Business Information, scientific research data, environmental databases, agency plans for responding to "incidents of national significance" and other security-related matters, and environmental monitoring data used in regulatory enforcement actions. more

DMARC: New Email Authentication Protocol

A consortium of companies including Google, Microsoft, Facebook and Paypal have announced that they were collaborating and coming up with a new protocol known as DMARC -- the Domain-based Message Authentication, Reporting and Conformance. What is DMARC? more

IPv6: Circling the IPv4 Wagons for a Last Stand

The last remaining stocks disappear from the shelves more quickly than ever before . . . IPv4 addresses that is. As the ARIN met in Toronto in April, an inordinate amount of time was spent yet again debating proposals on how to handle the dwindling stock of IPv4 addresses. I get the distinct impression that some people will still be tabling proposals and discuss the issue long after the last IPv4 block has been allocated by IANA and even the RIR's themselves. more

Pay Me Now or Pay Me Later - A TMCH Story

As an industry insider and technologist, it's always tempting when discussing something new, such as the Trademark Clearinghouse (TMCH), to jump into the gritty details to try solving problems. However, in this case, we would be jumping a step ahead because it's fair to say most of the general community is not well informed about the current implementation challenges around the TMCH. more

IoT in Africa: Urgent Regulation Required

Globally, people are connecting more and more "things" to the Internet. Devices that were traditionally offline or dumb like refrigerators, cars, watches, home cameras, air condition, door locks, agriculture monitoring devices, etcetera, are now being connected to the Internet. This is referred to as the "Internet of Things" (IoT). Using sensors, IoT devices collect data of some sort, which is then most likely shared over a network connection to a service provider, where some analysis is performed on the data. more

Bogus WSJ Story on Net Neutrality

Today's Wall Street Journal has a bogus, misleading story claiming that Google has been making deals with telephone and cable carriers that violate Network Neutrality. My BS detector was triggered by paragraph five, which reads: "One major cable operator in talks with Google says it has been reluctant so far to strike a deal because of concern it might violate Federal Communications Commission guidelines on network neutrality. 'If we did this, Washington would be on fire,' says one executive at the cable company who is familiar with the talks..." more

Defensive Domain Name Registrations – Exactly Where Should They Resolve?

Domain names can be valuable assets, but many corporate domain name portfolios consist of non-resolving domains. In a recent survey conducted by Brandsight, more than 91% of domain professionals said that ensuring domains redirect to relevant content was an extremely important or somewhat important goal. That said, it's not uncommon for less than half of corporate domain name portfolios to point to live content. more

Walks Like a Telco, Yalks Like a Telco… Must be a Telco

Vonage's latest woes are written up by Om Malik in Vonage: How Low Can You Go. More interesting than Om's reportage (Sprint wins case, Vonage ordered to pay damages, stock drops to $1.30) is the commentary afterward, in which one reader takes Om to task for the "gleeful" way in which he reports the demise of the VoIP companies... Boosters made the argument that VoIP was fundamentally cheaper than the TDM systems that phone companies deploy, and so therefore they enjoyed a price advantage in the market place. Anyone in the business of supplying telecom equipment, however, will tell you that the argument is flawed... more

What’s Next for Ethos

Since last fall, Ethos has actively engaged with ICANN and .ORG communities regarding our proposed acquisition of Public Interest Registry (PIR). Through that process, we demonstrated our desire to ensure that .ORG continues and thrives as an exemplary service for the mission-driven community. ICANN has now declined to consent to the proposed change of control of PIR. more

The Dumb Pipe Question

Every few years, I read something that resurrects the old question of whether ISPs should be dumb pipe providers or something more. Some ISPs have fought against the idea of being dumb pipe providers and want to believe they are far more than that. The latest event that raises this question anew is AT&T's debacle with ditching DirecTV and WarnerMedia. AT&T was clearly not content with being considered as only a dumb pipe provider. more

The Impressive Growth in Global Internet Stats (2011)

The ITU launched its latest statistics report, the World in 2011: ICT Facts and figures, which revealed impressive growth in a number of areas such as global internet use, particularly in developing countries. The report included further key details such as: "One third of the world's population are forecast to be online by the end of 2011..." more

The Economy, Not Surveillance or Weapons Systems, Is the Real Source of National Security

The worldwide public discussion about surveillance produced by the Snowden revelations has so far largely missed a major strategic fault with national security arguments for continued mass surveillance: that economic damage to the technology sector but more fundamentally to the wider economy is a likely result. This damage is also likely to undermine security far more than any potential gains from continuing as we are - or continuing but with some transparency or narrowing that leaves the existing industrial scale surveillance system largely unchecked. more

Civil Society Cautions Against ICANN Giving Governments Veto Over Geographic Domain Names

A group of twenty-four civil society organizations and individuals today submitted a joint statement regarding a proposal from an ICANN Governmental Advisory Committee (GAC) sub-group on the use of "geographic names" in top-level domains. The joint civil society statement cautioned against the adoption of the GAC proposal that would give governments veto power on domains that use "geographic names." more

Topics

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days