Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Internet Security and the Multistakeholder Approach: Is It Attainable?

Internet Security is a topic that has drawn a lot of attention over the past year. As awareness grows that cooperation is necessary, it dawns on people that there are many and very different stakeholders involved, stakeholders that may never have met before. Let alone have cooperated. An example of an approach is the National Cyber Security Council (NCSC) that was installed in The Netherlands on 30 June. This is a high level council that will give advice to public as well as private entities on how to better secure themselves and society at large against cyber attacks and how to become more resilient. However, without the right approach it is doomed to become a talking shop. more

2nd Round gTLDs: the Good, the Bad, and the Ugly

This post outlines the advantages (good) and threats (bad) that can make or break a gTLD, and the eternal fact that some applications will doom themselves to failure (ugly). The Good... Waiting until the second round to apply for a gTLD may end up being a virtue for the following reasons... more

Phish or Fair?

It shouldn't be a big surprise to hear that phishing is a big problem for banks. Criminals send email pretending to be a bank, and set up web sites that look a lot like a bank. One reason that phishing is possible is that e-mail has no built in security, so that if a mail message comes in purporting to be from, say, [email protected], there's no easy way to tell whether the message is really from bankofamerica.com, or from a crook. more

Searching for Truth in DKIM: Part 2 of 5

In part 1, we explained that the DKIM "d=" value identifies the domain name which signed the message, which may be a different domain name from the author of the message. Tying the signing and author domains together will require an additional standard: Author Domain Signing Practices (ADSP). In IETF parlance, the "author domain" is the domain name in the From: header, so ADSP is a way for the author domain to publish a statement specifying whether any other domain name should ever sign a message purporting to be From: that author domain... more

Should You Whitelist Your Vulnerability Scanning Service Provider?

Unlike consultant-led penetration testing, periodic or continual vulnerability scanning programs have to operate harmoniously with a corporation's perimeter defenses. Firewalls, intrusion prevention systems, web proxies, dynamic malware analysis systems, and even content delivery networks, are deployed to protect against the continuous probes and exploit attempts of remote adversaries -- yet they need to ignore (or at least not escalate) similar probes and tests being launched by the managed security service providers an organization has employed to identify and alert upon any new vulnerabilities within the infrastructure or applications that are to be protected. more

Come to the First Ever Dedicated New gTLD Conference: .nxt

Sometimes the heavens align. With the release of a number of resolutions from the ICANN Board on Sunday, we learnt two things: One, that there is a determined drive to get the rules for new Internet extensions, gTLDs, finalized in December at a meeting in Cartagena. And two, that the meeting immediately after that - in March 2011 - will be held in San Francisco. more

The Battle for IoT

There is an interesting battle going on to be the technology that monetizes the control of Internet of Things devices. Like a lot of tech hype, IoT has developed a lot slower than initially predicted -- but it's now finally becoming a big business. I think back to a decade ago when tech prognosticators said we'd soon be living in a virtual cloud of small monitors that would monitor everything in our life. According to those early predictions, our farm fields should already be fully automated, and we should all be living in the smart home envisioned by the Jetsonsmore

Computing Clouds in Orbit – A Possible Roadmap

Last week, I predicted that much of the Internet and most cloud datacenters would launch into space in the next ten years. Today the only part of the Internet in space is a very small amount of "bent-pipe" access: signals which go from a user to a satellite and bounce back down to a ground station which feeds them into the terrestrial internet where all processing is done and all queries answered by internet-connected servers, many of them in cloud data centers. more

No Virginia, You Have No Duty to Secure Your WiFi Access Point

Every now and again a report flies across the network about the police breaking down someone's door and attempting to arrest the home owner for bad things online - assuming that whatever happened from that person's Internet connection is their fault. Now there are lots of problems with this - lots of problems. But one of the big ones is that anyone can access an open access point... more

Reasons Why You Should NOT Apply for a .BRAND New gTLD

There are two kinds of new domain name extensions: those dedicated to selling domain names through the network of accredited Registrars and those dedicated to a personnel use. I call these "dotBRANDs" or ".brand" new gTLDs since they are used - most of the time - by Trademarks for their own benefit. This article focuses on .BRAND new generic Top-Level Domains. In the ICANN vocabulary, these are "Registry Agreements with Specification 13". more

Adopting IDN to Reach New Untapped Markets

An IDN is a domain name which uses a particular encoding and format to allow a wider range of scripts to represent domain names such as Gujarati, Arabic, Chinese, Cyrillic, Devanagari and many more scripts. In simple words, a domain name with non-English characters will be called an Internationalized Domain Name. Humans have a variety of languages and alphabets that are familiar to them, and domain names do too. IDN unlocks an increased familiarity and affinity for humans. more

GDPR: Registries to Become Technical Administrators Only?

On 11 December 2017, about 25 participants from Europe and the US attended the public consultation for the brand new GDPR Domain Industry Playbook by eco (Association of the Internet Industry, based in Germany) at the representation of the German federal state Lower Saxony to the European Union in Brussels. The General Data Protection Regulation (GDPR) poses a challenge for the Registries, Registrars, Resellers and ICANN. more

Amazon Aerospace and Satellite Solutions: Integrating Satellites and Terrestrial Services

Since its founding, Amazon has reinvested profit in building infrastructure. They began with retail sales and distribution infrastructure and later added Amazon Web Services (AWS), providing data center and hosting infrastructure. Amazon founder Jeff Bezos also established Blue Origin, a company to provide satellite launch service and eventually to support space travel. Last year Amazon filed an application for a 3,236-satellite constellation of low-earth orbit Internet service satellites - Project Kuiper. more

The Senate Should Take the DOTCOM Act Off Cruz Control

Recently we speculated on the question "Will 2016 Politics Trump Bipartisan Support for the MSM and DOTCOM Act?" That article discussed the possibility that the Obama Administration's decision to relinquish ICANN stewardship via the periodic re-awarding of the IANA functions contract might arise in the ongoing U.S. Presidential sweepstakes, most likely from a Republican entrenched in the far right wing of that Party. We also discussed whether its introduction might erode the currently broad and bipartisan Congressional acceptance of the transition... more

Trademark Clearinghouse Debate is Not About the Trademark Clearinghouse!

A comment period on the "strawman", a proposal to update the Trademark Clearinghouse (TMCH), is currently underway. Originally planned to end on January 11, it has been extended by ICANN to February 5. The comment portal has so far received 89 email contributions. A fair number, but the real story is how many major brands have spoken out on the proposed amendments to the TMCH model. more

Topics

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

DNS Security

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days