Internet Security is a topic that has drawn a lot of attention over the past year. As awareness grows that cooperation is necessary, it dawns on people that there are many and very different stakeholders involved, stakeholders that may never have met before. Let alone have cooperated. An example of an approach is the National Cyber Security Council (NCSC) that was installed in The Netherlands on 30 June. This is a high level council that will give advice to public as well as private entities on how to better secure themselves and society at large against cyber attacks and how to become more resilient. However, without the right approach it is doomed to become a talking shop. more
This post outlines the advantages (good) and threats (bad) that can make or break a gTLD, and the eternal fact that some applications will doom themselves to failure (ugly). The Good... Waiting until the second round to apply for a gTLD may end up being a virtue for the following reasons... more
It shouldn't be a big surprise to hear that phishing is a big problem for banks. Criminals send email pretending to be a bank, and set up web sites that look a lot like a bank. One reason that phishing is possible is that e-mail has no built in security, so that if a mail message comes in purporting to be from, say, [email protected], there's no easy way to tell whether the message is really from bankofamerica.com, or from a crook. more
In part 1, we explained that the DKIM "d=" value identifies the domain name which signed the message, which may be a different domain name from the author of the message. Tying the signing and author domains together will require an additional standard: Author Domain Signing Practices (ADSP). In IETF parlance, the "author domain" is the domain name in the From: header, so ADSP is a way for the author domain to publish a statement specifying whether any other domain name should ever sign a message purporting to be From: that author domain... more
Unlike consultant-led penetration testing, periodic or continual vulnerability scanning programs have to operate harmoniously with a corporation's perimeter defenses. Firewalls, intrusion prevention systems, web proxies, dynamic malware analysis systems, and even content delivery networks, are deployed to protect against the continuous probes and exploit attempts of remote adversaries -- yet they need to ignore (or at least not escalate) similar probes and tests being launched by the managed security service providers an organization has employed to identify and alert upon any new vulnerabilities within the infrastructure or applications that are to be protected. more
Sometimes the heavens align. With the release of a number of resolutions from the ICANN Board on Sunday, we learnt two things: One, that there is a determined drive to get the rules for new Internet extensions, gTLDs, finalized in December at a meeting in Cartagena. And two, that the meeting immediately after that - in March 2011 - will be held in San Francisco. more
There is an interesting battle going on to be the technology that monetizes the control of Internet of Things devices. Like a lot of tech hype, IoT has developed a lot slower than initially predicted -- but it's now finally becoming a big business. I think back to a decade ago when tech prognosticators said we'd soon be living in a virtual cloud of small monitors that would monitor everything in our life. According to those early predictions, our farm fields should already be fully automated, and we should all be living in the smart home envisioned by the Jetsons. more
Last week, I predicted that much of the Internet and most cloud datacenters would launch into space in the next ten years. Today the only part of the Internet in space is a very small amount of "bent-pipe" access: signals which go from a user to a satellite and bounce back down to a ground station which feeds them into the terrestrial internet where all processing is done and all queries answered by internet-connected servers, many of them in cloud data centers. more
Every now and again a report flies across the network about the police breaking down someone's door and attempting to arrest the home owner for bad things online - assuming that whatever happened from that person's Internet connection is their fault. Now there are lots of problems with this - lots of problems. But one of the big ones is that anyone can access an open access point... more
There are two kinds of new domain name extensions: those dedicated to selling domain names through the network of accredited Registrars and those dedicated to a personnel use. I call these "dotBRANDs" or ".brand" new gTLDs since they are used - most of the time - by Trademarks for their own benefit. This article focuses on .BRAND new generic Top-Level Domains. In the ICANN vocabulary, these are "Registry Agreements with Specification 13". more
An IDN is a domain name which uses a particular encoding and format to allow a wider range of scripts to represent domain names such as Gujarati, Arabic, Chinese, Cyrillic, Devanagari and many more scripts. In simple words, a domain name with non-English characters will be called an Internationalized Domain Name. Humans have a variety of languages and alphabets that are familiar to them, and domain names do too. IDN unlocks an increased familiarity and affinity for humans. more
On 11 December 2017, about 25 participants from Europe and the US attended the public consultation for the brand new GDPR Domain Industry Playbook by eco (Association of the Internet Industry, based in Germany) at the representation of the German federal state Lower Saxony to the European Union in Brussels. The General Data Protection Regulation (GDPR) poses a challenge for the Registries, Registrars, Resellers and ICANN. more
Since its founding, Amazon has reinvested profit in building infrastructure. They began with retail sales and distribution infrastructure and later added Amazon Web Services (AWS), providing data center and hosting infrastructure. Amazon founder Jeff Bezos also established Blue Origin, a company to provide satellite launch service and eventually to support space travel. Last year Amazon filed an application for a 3,236-satellite constellation of low-earth orbit Internet service satellites - Project Kuiper. more
Recently we speculated on the question "Will 2016 Politics Trump Bipartisan Support for the MSM and DOTCOM Act?" That article discussed the possibility that the Obama Administration's decision to relinquish ICANN stewardship via the periodic re-awarding of the IANA functions contract might arise in the ongoing U.S. Presidential sweepstakes, most likely from a Republican entrenched in the far right wing of that Party. We also discussed whether its introduction might erode the currently broad and bipartisan Congressional acceptance of the transition... more
A comment period on the "strawman", a proposal to update the Trademark Clearinghouse (TMCH), is currently underway. Originally planned to end on January 11, it has been extended by ICANN to February 5. The comment portal has so far received 89 email contributions. A fair number, but the real story is how many major brands have spoken out on the proposed amendments to the TMCH model. more
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byCSC
Sponsored byRadix