Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Comments on the National Strategy for Trusted Identities in Cyberspace

The White House has recently released a draft of the National Strategy for Trusted Identities in Cyberspace. Some of its ideas are good and some are bad. However, I fear it will be a large effort that will do little, and will pose a threat to our privacy. As I've written elsewhere, I may be willing to sacrifice some privacy to help the government protect the nation; I'm not willing to do so to help private companies track me when it's quite useless as a defense. more

A Look at RFC8200 Which Officially Made IPv6 an Internet Standard

The IETF published RFC8200 last week, which officially makes IPv6 an Internet Standard. While this move was a long time coming -- IPv6 has now reached about 20% deployment -- a more interesting question is: what has changed since RFC2460, which was a draft standard, was published in 2013? After all, the point of moving from the experimental to the draft standard to the internet standard states is to learn more about the protocol as it operates on the wire... more

HBO GO: Forced to Rethink Delivery Method

The granddaddy of Pay TV programmers continues to create ground-breaking content especially with its new series "Veep". The edgy new sitcom produces uninterrupted and raunchy situations for a fictional Vice President who cannot get out of her own way, making it hilarious and award-winning. Yet, HBO GO is tied to Cable TV/Satellite economics by an umbilical cord that will be hard to break. more

Evolving From an Internet Registry to IoT Registry

As the name indicates, the Internet of Things (IoT) should be an extension of the Internet. However, in reality, most IoT applications are Siloed infrastructures. We will analyse the main challenges in the IoT and explain how an Internet registry could be evolved to provide a secure and privacy integrated Identity and access management service for IoT. more

End of Cybersquatting? The gTLD Advantage

On the other hand, major dot brand generic Top-Level Domains (gTLDs) are for internal and controlled sub registrations, they would not be open to first come public offerings and therefore it makes no sense for IBM to plan advance purchase of ibm.canon, as Canon, owner of their own gTLD dot canon, unless mutually agreed between two brands, would have no incentive to sell such a registration to a cyber squatter or to anyone else for that matter. more

Failure of the Broadband Plan?

Craig Moffett sees this as I do: "If LTE networks are going to be usage-capped, then the last pretense that LTE can be positioned as a substitute for terrestrial broadband would seem to be gone." The heart of the U.S. broadband plan is to release more spectrum - enough for 10-20 networks like Verizon's LTE now building - and pray that will be enough competition in five to seven years to check price increases. more

Preserving ICANN’s Independence Through Bold Action – Not Inaction

This week, the ICANN Board will vote on whether to approve the transfer of control of the .ORG domain to a private equity firm called Ethos Capital. This is a weighty decision for ICANN, since in order to approve the sale, it will have to convince itself that this is the right choice in the face of tremendous and widespread opposition, including from those who will be most affected by the sale. more

New Report Uses Media Impressions as a Measure for New TLD Usage and Success

With so many new domain extensions now available in the online space, it is very hard to measure the success of an individual TLD (Top Level Domain). There have been various methods used, such as total domain registration count, hosted live sites in the Alexa top-million, premium domain sales, aftermarket value, etc. Many of these metrics do help in understanding a new extension's progress, however, top-line registrations alone do not tell a complete story. more

Why Aren’t We Fixing Route Leaks?

In case you missed it (you probably didn't), the Internet was hit with the Monday blues this week. As operator-focused lists and blogs identified, "at 17:47:05 UTC yesterday (6 November 2017), Level 3 (AS3356) began globally announcing thousands of BGP routes that had been learned from customers and peers and that were intended to stay internal to Level 3. By doing so, internet traffic to large eyeball networks like Comcast and Bell Canada, as well as major content providers like Netflix, was mistakenly sent through Level 3's misconfigured routers." more

Report on Smart Grid Cyber Security

A recent report from Pike Research, "Smart Grid Cyber Security" has found if smart grids can realize their full potential, consumers, utilities, nations, and even the earth itself will benefit. As with nearly any new technology, the industry focus has been on getting smart grids up and running, often with little consideration for cyber security issues. more

Call for ICANN to Educate and Not Mislead GAC

I read with interest the recent blog written by Theresa Swinehart a Sr. Advisor to the President on Strategy. She wrote: "The most critical element of this [ICANN Transition] process is trust and alignment. To ensure success on this accountability track, we must as a community work closely together to make sure that the final process is meaningful. There is plenty of work to be done in an ambitious period of time." more

CallService.biz Shut Down by the FBI

Gary Warner over at Cyber Crime and Doing Time has a good post up this week about the CallService.biz website being shut down. I have posted a few good excerpts and added my comments to the end. ... Warner's take on the world of spam, malware, hacking and phishing is that unless people actually go to jail because they are spamming, the problem of spamming will never get better. That's because when the security industry fixes the latest hole or comes up with a new technology to stop the newest threat, spammers simply move onto another. more

Your AI Strategy Canvas: Part 1

As the final project of my UC Berkeley School of Information course in Artificial Intelligence strategies, we had to submit an AI strategy canvas. Today, I will attempt to share important aspects of the canvas, so you and your team may have a template to work from and consider. Let's begin. We will look at both a strategy and operations perspective both internally and externally. Part one will include Internal and Operational Strategies, while Part II will examine external processes, threats, and procedures. more

ICANN Reveals Evaluation Timing for New gTLDs

Having consigned to oblivion the unpopular "digital archery" method of determining who goes first in the new gTLD round, ICANN today announced that it was going to evaluate all new gTLD applications concurrently (the "single batch"), and release all results simultaneously. The decision is a victory for clarity and a very good result for new gTLD applicants. more

The Real Uneven Playing Field of Name Collisions

Recent comments on the name collisions issue in the new gTLD program raise a question about the differences between established and new gTLDs with respect to name collisions, and whether they're on an even playing field with one another. Verisign's latest public comments on ICANN's "Mitigating the Risk of DNS Namespace Collisions" Phase One Report, in answering the question, suggest that the playing field the industry should be concerned about is actually in a different place. The following points are excerpted from the comments submitted April 21. more

Topics

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days