Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Limitations, Delays, and Laches as Defenses in Cybersquatting Claims

In passing the baton for combating cybersquatting to the Internet Corporation for Assigned Names and Numbers (ICANN) the World Intellectual Property Organization (WIPO) recommended that "claims under the administrative procedure [should not] be subject to a time limitation" (Final Report, Paragraph 199). ICANN agreed and the UDRP contains no limitation period for making a claim. The absence of a limitation period does not necessarily forego applying equitable defenses for delay, but the consensus of Panels appointed to decide disputes under the Uniform Domain Name Dispute Resolution Policy (UDRP) is that they are not applicable in countering cybersquatting claims. more

.APP gTLD Signs of Life Web Usage Survey

When a new TLD goes into General Availability or Land Rush, the first few days are filled with registrations that reflect how the market perceives the TLD. Registrants may register domain names to develop or for speculative purposes. Others register to protect their brand. The first major web usage survey for a new TLD is generally a Signs of Life survey where the early stages of development can be detected. These surveys were based on the May 19th, 2018 .APP zone file. more

Accountability and Redress

In ICANN circles these days, accountability is the buzz word. Nearly everybody is talking about it. Generally everybody is in favor of it, but that's where the agreement ends. This paper urges action by ICANN to provide a means for redress of grievances as an essential element of accountability. I would like to review the ICM case (the delegation of the .xxx domain), and the role of ICANN's Independent Review Panel (the IRP). As you will recall, the ICANN Board had originally awarded .xxx to ICM, but in a subsequent reconsideration had reversed the award. more

A Bigger Boat: Application Security Outgrows Capacity for CIOs

There is a classic scene in the movie, "Jaws," when Roy Scheider gets a look at the size of the shark circling his fishing vessel and says, "We're going to need a bigger boat." The same case can be made for CIOs dealing today with application security. Hackers from all over the world are circling business and government like great whites looking for vulnerabilities in Internet-facing applications. The growth of applications is great for doing business but they have become chum in the water for predators. more

Provoking National Boundaries on the Internet? A chilling thought…

The impact of the recently revealed US government data collection practices may go well beyond the privacy ramifications outlined in the Internet Society's statement: expect a chilling effect on global, resilient network architecture. As governments of other countries realize how much of their citizens' traffic flows through the US, whether or not it is destined for any user or service there, expect to see moves to curtail connections to and through the US. more

SES Pursues Multi-Orbit Satellite Internet via Strategic Partnerships

SES's first multi-orbit partnership was Cruise mPOWERED + Starlink, providing a managed blend of SES MEO and Starlink LEO service for maritime operators, and we can expect similar bundled services in aviation and enterprise markets. more

Customer Confusion over New(ish) gTLDs Targeting Financial Services

For the last decade and a bit, banking customers have been relentlessly targeted by professional phishers with a never-ending barrage of deceitful emails, malicious websites and unstoppable crimeware -- each campaign seeking to relieve the victim of their online banking credentials and funds. In the battle for the high-ground, many client-side and server-side security technologies have been invented and consequently circumvented over the years. Now we're about to enter a new era of mitigation attempts... more

A Cynic’s View of 2015 Security Predictions - Part 1

Cyber security was a hot topic in 2014. It seemed not a week went by without details of a high profile data breach hitting the headlines. To recap, the Sony breach was one of the most notable, as was the Home Depot hack, while details of widespread security vulnerabilities such as Heartbleed, Shellshock and Poodle were also revealed. But what will 2015 bring? Will it be more of the same, or have cyber criminals got some new tricks up their sleeves? more

The 5 Stages of gTLD Shock

PCWorld lists new gTLDs among the 5 major changes facing the Internet in 2012. No doubt the sudden introduction of hundreds of new gTLDs will have a significant impact on the Internet. I postulate that users will react to new gTLDs by going through the following stages... more

Why ICANN Doesn’t Need to Go Back to the GAC Over Dot-XXX

This Friday, it looks as though the ICANN Board will follow the clear conclusions drawn by its independent review and approve dot-xxx. Given the importance of the first use of the review process, the importance of the Board being seen to be accountable and the fact that the community was pretty unanimous in recent public comment, it is pretty much the only reasonable course of action. The question then is: how do things move forward? more

Watch the 2014 Internet Governance Forum (#IGF2014) Live All This Week from Istanbul

The Ninth Annual Internet Governance Forum (IGF) Meeting is taking place all this week, September 2-5, 2014, in Istanbul, Turkey and live video streams are available for all the sessions... I watched the opening session live stream today from my home office in New Hampshire, USA, and the quality was excellent. There was also a live text transcription. more

IPv6… The Dangers of Prolonged Inter AS Tunnel Vision

Tunnel vision is a rather serious medical condition and the Internet or at least a number of service providers could be at risk if not treated soon enough. Symptoms of inter AS (Autonomous System) tunnel vision are many slower connections with IPv6 compared to IPv4 with some failing all together. Reason is that tunnels, especially inter-AS tunnels, can lead to long paths and non-optimal routing. more

Caribbean Businesses Can Make Good Use of Free DNS Security

IBM Security, Packet Clearing House (PCH) and Global Cyber Alliance (GCA) unveiled a free Domain Name System (DNS) service designed to protect all Internet users from a wide range of common cyber threats. Launched on November 16 with simultaneous press events in London, Maputo and New York, the public DNS resolver has strong privacy and security features built-in and can be enabled with a few changes to network settings, as outlined on the organisation's website. more

It’s Time for the New gTLD Delays to End

The next few short weeks in the run-up to ICANN's Cartagena meeting could prove the most important time yet for the organization to show that it is a credible and capable overseer of the domain name system. After over two years of delays, tens of thousands of email exchanges, weeks of heated face-to-face discussions, and many millions of accumulated frequent flier miles, the time has arrived for ICANN to finally draw a line under the new top-level domain policy-development process and name the date for the opening of the first-round application window. more

Why the Pandemic Makes Domain Names More Valuable Than Ever

In the United States, at least 25,000 brick and mortar businesses will close in 2020 due to the Coronavirus (source: Coresight). I believe this will only be the tip of the iceberg. The businesses that fight to stay alive will become 100% dependent on the Internet to generate their revenue. No longer able to rely on foot traffic to their old brick and mortars, the popularity and brand-ability of their websites will solely dictate their ability to survive in the coming years. more

Topics

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

DNS Security

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days