Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

ICANN Documentary Information Disclosure Policy Request

Listed below is correspondence that I have submitted to ICANN's general counsel in connection with the organization's stated documentary information disclosure policy. more

Internet Governance Forum Publishes BPs on Regulation and Mitigation of Unsolicited Communications

The IGF this morning published a number of reports, including the aforementioned one, at the URL provided, titled 'IGF 2015 Best Practice Forum Regulation and mitigation of unsolicited communications.' The reports can be found in the included URLs on the IGF Website. more

The Big Bad Internet

I often think there are only two types of stories about the Internet. One is a continuing story of prodigious technology that continues to shrink in physical size and at the same time continue to dazzle and amaze us... The other is a darker evolving story of the associated vulnerabilities of this technology where we've seen "hacking" turn into organised crime and from there into a scale of sophistication that is sometimes termed "cyber warfare". And in this same darker theme one could add the current set of stories about various forms of state sponsored surveillance and espionage on the net. more

Phishing Costs Companies over $411 Million per Alert

Phishing blindsides businesses' best defenses and takes a toll whose price tag still hasn't been pinned down. Here's one estimate: $441 million per attack, according to a recent study of the cybercrime's effect on stock market data (market value, volume of shares traded, and stock volatility) of global firms. The authors use "event studies" techniques (i.e., analyzing the impact of specific types of events on companies' market performance) to analyze nearly 2,000 phishing alerts by 259 companies in 32 countries... more

A New Undersea Cable - Landing in Cuba?

Deep Blue Cable is planning a Caribbean cable - phase one, the solid line shown on the map, bypasses Cuba but phase two shows two Cuban landing points. The phase two cities are not shown, but one appears to be near Havana and the other near Playa Girón. The phase one route survey is underway. Cable installation will begin in September 2018, and it is scheduled to be ready for service in December 2019. more

It’s Official: 2016 Was a Record Year for Domain Name Disputes

As I predicted more than three months ago, 2016 turned out to be a record year for domain name disputes, including under the Uniform Domain Name Dispute Resolution Policy (UDRP). That's according to statistics from the World Intellectual Property Organization (WIPO), the only UDRP service provider that publishes real-time data on domain name disputes. WIPO's statistics show 3,022 cases in 2016 -- an increase of almost 10 percent from 2015. The previous most-active year for domain name disputes was 2012... more

Canadian Spam Law Update

As you may know, there are two laws currently being discussed in Canadian legislative assemblies: Senate Bill S-220, a private member’s bill with private right of action and criminal remedies; Parliamentary Bill C-27, tabled by the government, with private right of action, coordination between various enforcement agencies... more

Background on .EU the Upcoming European Identity

Progress is being made towards launching a .eu top-level domain for European individuals, business and organisations.

On 22 May 2003, the European Commission announced its decision to designate the European Registry for Internet Domains (EURID) as the Registry for the new top-level domain (TLD) .eu. EURID is made up of three founder members ? the registry operators for the country code top-level domains (ccTLDs) .be (Belgium), .it (Italy) and .se (Sweden). The Commission?s decision follows a call for expressions of interest published last September and an evaluation by independent experts of the seven applications received. more

Internet Society Releases Internet of Things (IoT) Overview: Understanding the Issues and Challenges

Near the end of the first decade of this century, the world reached an Internet milestone. The number of Internet-connected devices surpassed the number of people alive on planet Earth. At the time, seven billion devices had already been connected to the Internet, and this went completely unnoticed by most people. This moment represented an important sign of the rapid pace in which we are adopting technology and embracing Internet connectivity. more

IANA: A Tale of Two Fails

The IANA -- Internet Assigned Numbers Authority -- is, functionally, the boiler room of the Internet. Every protocol in use to shovel data from Tallahassee to Timbuktu? Listed there. IP addresses? They are the root from which all addresses flow. Domain names? They are the Source. The entire operation is chock-full of magic numbers, numbers that form and fuel the digital world we use daily. But there are other, lesser-known numbers... It is of PENs that I write today... more

Oil and Gas Cyber Security Forum

A reader recently brought to my attention an upcoming conference in London in the UK -- The Oil and Gas Cyber Security Forum. Here's a little blurb: "Despite investments into state of the art technology, a majority of the oil and gas industry remain blissfully unaware of the vulnerabilities, threats and capability of a malicious cyber attack on control systems..." I bring this up because it is relevant to the trends in cyber security that we see this year - that of the Advanced Persistent Threat. more

ICANN and GAC: A New Role Needed?

Syracuse University professor Milton Mueller published a blog under the title "Will the GAC go away if the Board doesn't follow its advice?". Having been to a number of (very limited) ICANN meetings on behalf of law enforcement cooperation, I would like to share a few - probably thought provoking - observations. The GAC should not leave ICANN but it may be more efficient if its role changed and its efforts were aimed at a different form of output. more

I Don’t Need a Signature to Know It’s Going to Be Bad…

There was a period of time not long ago in which signature-based threat detection was cutting-edge. Antivirus, intrusion detection systems (IDS), data leakage prevention (DLP), content filtering and even anomaly detection systems (ADS) all continue to rely heavily upon static signatures. In recent years vendors have shied away from discussing their dependence on such signatures -- instead extolling supplemental "non-signature-based" detection technologies. more

Cyberspace Security in Africa – Where Do We Stand?

Very few African states today have developed a national cybersecurity strategy or have in place cybersecurity and data protection regulations and laws. Yet, the continent has made major headway in developing its digital ecosystem, and moreover, it is home to the largest free trade area in the world, which is predicted to create an entirely new development path harnessing the potential of its resources and people. more

Who is Responsible in Our Cloudy World?

A number of large technology companies, including Google, Microsoft and Yahoo!, have announced that they have signed up to a voluntary code of conduct on how they do business in countries that curtail freedom of expression like China and Singapore... It's not surprising to see this sort of self-regulation being proposed as otherwise political initiatives like the Global Online Freedom Act, passed in one US Senate committee but currently floating in legislative limbo, could actually make it into law. more

Topics

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

DNS Security

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days