Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Evolution and the Internet

Evolution isn't just about biology. Our focus on biology is part of the world-wide challenge in getting people to understand how systems evolve. Think of the resistance Galileo faced when he said that the universe didn't, literally, revolve round us. One reason people have difficulty accepting undirected evolution is that educators don't give people a good sense of why things "work". It's a difficult problem because we tend to look for a "reason" for why things are the way they are... more

Threats to Internet Oversight Mount as Key Protection Expires

Before the US Government abdicates its oversight of the Internet Corporation for Assigned Names and Numbers (ICANN) it should take a long, hard look at the mounting efforts by world governments to assume greater power over the Internet's addressing system. If those efforts meet no further resistance, the once-theoretical threat of "capture" could become a reality. At the end of September, the Joint Project Agreement (JPA) between ICANN and the US Government is set to expire. The JPA is part of a decade-long agreement where the US transitions control of Internet addressing to ICANN. more

Mind the Step(-function): Are We Really Less Secure Than We Were a Year Ago?

In January 1995, the RFC Editor published RFC 1752: "The Recommendation for the IP Next Generation Protocol"... The Internet is a security officer's nightmare -- so much openness, so easy to capture packet traffic (and/or spoof it!) and send all manner of unwanted traffic. It was built as a research network, hosted by institutes that were 1/ professionally responsible and 2/ interested in working together collegially. So, in the 19 years since the publication of that statement, have we really failed to address the stated goal? more

The Broad Brush of LegitScript, Painting Inaccuracies About CIPA

The president of LegitScript recently authored an inaccurate and misleading critique of the Canadian International Pharmacy Association (CIPA) that was clearly intended to smear our reputation with a broad brush dipped in inaccuracies and scare tactics. This response paints the true picture of who we are and the benefits CIPA Members offer U.S. consumers. more

Measuring the Cost of Cybercrime

Last week at Virus Bulletin in 2012, Tyler Moore of Southern Methodist University (SMU) gave a talk entitled "Measuring the cost of cyber crime." It was a study done in collaboration with multiple individuals in multiple countries. The study sought to answer this question - How much does cyber crime cost? Up until this point, nobody really knew. more

Internet as Non-Kinetic WMD

With each passing day, a new public opinion article appears or U.S. government official pronounces how the open internet is abetting some discovered catastrophic effects on our societal institutions. In just one week, the examples include increased information on FSB & GRU attacks on electoral systems and infrastructure, Trump's obliging tactical destruction of societal norms and propagation of the QAnon cult, U.S government agency officials playing "cyber security spin-the-bottle" at press conferences... more

New Top Level Domains Application Metering - Figure It Out ICANN!

Let me begin by saying that I am big supporter of ICANN. But good grief ICANN, why must the ENTIRE new gTLD process be so painful? I could run through a long list of all the delays, missteps and glitches, but why bother? It's almost comical at this point -- although not for 1,930 new gTLD applicants who have been waiting for ICANN to get their act together. First we were led to believe that the batching of applications was necessary due to resourcing constraints, which I personally never understood as the evaluation of applications is being done be third-party consultants. more

Will Telcos Be Able to Harness the New Business Opportunities of 5G?

The industry would like to project 5G as a divergence from previous mobile technology evolution lines (1G-2G-3G-4G). They claim that this is a whole new ballgame, with completely new opportunities. But the big question will be whether this time round the telcos will be able to harness this new technology to create new business opportunities for themselves. 5G is only one element of a larger ecosystem that includes broadband access, IoT, M2M, cloud computing, data centres and data analytics... more

Radical Shift of Power Proposed at ICANN Putting Govts in Primary Decision Making Role

ICANN has proposed a major change to its bylaws that would require the organization to adopt all policy "advice" issued by the Governmental Advisory Committee (GAC) unless 2/3 of ICANN's non-conflicted board members vote to oppose the adoption of that governmental rule. This draconian proposal to change ICANN's bylaws would fundamentally transform ICANN away from being a "bottom-up" and "private-sector-led" organization and into a governmental regulatory agency... more

CRTC Denies CAIP Application on Throttling, But Sets Net Neutrality Hearing

This morning, the CRTC issued its much-anticipated ruling in the CAIP v. Bell case, the first major case to test the legality of Internet throttling. The Commission denied CAIP's application, ruling that Bell treated all of its customers (retail and wholesale) in the same throttled manner. This points to the challenge in this case -- it was not about discriminatory network practices per se, but rather about wholesale shaping in a specific context. more

Trademarks Tango in Cyber Ballrooms

The global trademark laws have served the business community well during the last century. But is it possible that with the advent of ICANN gTLD, a new layer of speed and protection would complement the trademark holders to further establish their name identity presence and visibility in the complex marketplace? Although the trademark laws have served the business community very well during the last century, now with the advent of ICANN gTLD platform, it appears that it will provide an additional layer of speedy protection and increase the name identity visibility resulting in market domination via name identity. more

Cyber Security Word Salad

Two months ago, the Trump White House published its National Cyber Strategy. It was followed a few days ago with the release of its draft NSTAC Cybersecurity "moonshot." The Strategy document was basically a highly nationalistic America-First exhortation that ironically bore a resemblance to China's more global two-year-old National Cybersecurity Strategy. more

In Which We Explore the Federal Laws that Apply to Cyberstalking

Tragedies frequently result in flurries of legal activity. Last years witnessed the Myspace tragedy in which a 13 year old girl committing suicide. Unfortunately stalking laws have been clumsy tools that are difficult if not impossible for law enforcement officials to wield. Where existing laws respond poorly to tragedies, the option behind Door Number One is to enact a new law, and the option behind Door Number Two is to argue for a reinterpretation of current law that would somehow miraculously shoehorn the tragedy into the law. Unlike game shows, legal contestants can pick both doors -- which is what happened in this case. more

It’s Official: China Now Has More Broadband Lines than the United States

It was just last year that those of us raising alarms about the massive half-decade market failure in the United States to adequately provision broadband services were facing a misinformation campaign that raw numbers mattered more than percentage rankings. According to this argument, the U.S. broadband market was sound because we had more broadband lines than anyone else. The misinformation brigade got so much attention that public interest groups had to issue reports systematically refuting the PR are marketing hype. more

We Already Are in the Quaternary Industrial Era

British economist Colin Clark (1905-1989) explained that the spendable income for the working class varied according to industry levels, i.e., the spendable income increased as they moved from the Primary industry to the Secondary from the Secondary to the Tertiary. These days when we are experiencing loss of jobs due to the cutting-edge ICT (Information and Communications Technology) of the 21st century without creating new jobs to replace them, we need to examine new economic and labor policies as we move from the Tertiary to the Quaternary industry. more

Topics

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Threat Intelligence

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days