Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Has Internet Governance Become Irrelevant?

When the Internet outgrew its academic and research roots and gained some prominence and momentum in the broader telecommunications environment it found itself to be in opposition to many of the established practices of the international telecommunications arrangements and even in opposition to the principles that lie behind these arrangements. more

Nominet/SOCA Cyber Crime Proposal: Allow Cross Border Reactions

Reading the policy proposal of Nominet, I get the feeling that something is overseen here. Putting all the jurisdictional hassle aside for a moment, cyber crime is international, cross-border. So what happens if a UK domain is used for criminal activity outside the UK only? more

Is the UN Assailing Internet Governance?

The coven of UN bodies with a hand in internet governance keeps getting bigger: not only is the General Assembly intending soon to decide the fate of the Internet Governance Forum (IGF), but if the decision coming out of New York does not give them enough of a role, the UN has a back-up plan. In May of 2011, no less than four specialized UN agencies, UNESCO, UNCTAD, UNDP and (perhaps most legitimately) the ITU, are planning a Conference what will allow them to insert themselves still further into the matter. more

A Multistakeholder Model if We Can Keep It: 25 Years of ICANN

I go back to the International Forum on the White Paper (IFWP). (Like Jeff, I was very young.) The Department of Commerce had just issued the White Paper, and there was a proposal that we pass control of the critical Internet identifiers to a new not-for-profit corporation with a bottom-up Multistakeholder way of making policy and an international board of directors. more

Interplanetary Internet

We had a very interesting presentation and discussion regarding the topic of interplanetary internet with my international colleagues, of which Vint Cerf – one of the “fathers of the internet” – is also a member. As a partner of the Interplanetary Networking Special Interest Group (IPNSIG), he took us on a journey that he has been involved with over the last 20 years regarding communication networks in space. A true mind-broadening experience. more

A Cynic’s View of 2015 Security Predictions - Part 4

Lastly, and certainly not the least, part four of my security predictions takes a deeper dive into mobile threats and what companies and consumer can do to protect themselves. If there is one particular threat category that has been repeatedly singled out for the next great wave of threats, it has to be the mobile platform -- in particular, smartphones... The general consensus of prediction was that we're (once again) on the cusp of a pandemic threat. more

Why the Pandemic Makes Domain Names More Valuable Than Ever

In the United States, at least 25,000 brick and mortar businesses will close in 2020 due to the Coronavirus (source: Coresight). I believe this will only be the tip of the iceberg. The businesses that fight to stay alive will become 100% dependent on the Internet to generate their revenue. No longer able to rely on foot traffic to their old brick and mortars, the popularity and brand-ability of their websites will solely dictate their ability to survive in the coming years. more

CE Router Certification Opens Up the Last Mile to IPv6 Fixed-Line

With reference to IPv6, probably most end users do not have any sense of it. The mainstream condition in the industry is that network carriers and content/service providers stick to their own arguments. Carriers consider lack of IPv6 content and service as the reason demand for IPv6 from the users is very low. The content and service providers believe that users cannot have access to content and service through IPv6 and thus carriers should provide the service in the background. more

Standing Up for a Safe Internet

Back when I started working in this industry in 2001, ICANN was small, the industry was tight, and things moved slowly as interest groups negotiated a balance amongst the impacts of change. Change often meant added overhead and, at the very least, a one-time cost effort to implement on the commercial side. Registries and registrars preferred to be hands-off when it came to how their domains were being used. But e-crime became big business during the 2000s. more

The Epsilon Phishing Model

Phishing researcher Gary Warner's always interesting blog offers some fresh perspective on clicking links on emails, as the crux of the phishing problem. Gary writes: "There is a saying 'if you give a man a fish, he'll eat for a day, but if you teach a man to fish, he can feed himself for a lifetime.' In the case of the Epsilon email breach the saying might be 'if you teach a man to be phished, he'll be a victim for a lifetime.' In order to illustrate my point, let's look at a few of the security flaws in the business model of email-based marketing, using Epsilon Interactive and their communications as some examples." more

ICANN’s Final Preparations for New gTLDs

I think it's fair to say that ICANN is in a state of near meltdown at the moment. With less than a week to go before the new gTLD program's first application window is opened, on Thursday January 12, 2012, the amount of work being done is mind-bending. The ICANN Board held a special meeting on January 5 to determine the program's state of readiness ahead of the launch. more

Masking Identity with Proxy/Privacy Services

No censure attaches to having domain names registered by proxy/privacy services. However, while the practice has become routine for protecting privacy and sensitive information, registering in the name of a proxy is still taken into account in assessing intention, and even circumstantial evidence without contradiction or explanation can tip the scale in complainant's favor. more

Blocking Shodan

The Internet is chock full of really helpful people and autonomous systems that silently probe, test, and evaluate your corporate defenses every second of every minute of every hour of every day. If those helpful souls and systems aren't probing your network, then they're diligently recording and cataloguing everything they've found so others can quickly enumerate your online business or list systems like yours that are similarly vulnerable to some kind of attack or other. more

Why You Needed to Be at eComm 2009

I've been posting photos and snippets during eComm 2009 this week, but composing my overall impressions has been another matter. Sitting through 3 days mostly filled with continuous 15 minute presentations is a surefire recipe to fry your brain, and most people I talked to were topped out well before things wrapped up Thursday night. It's information overload of the highest -- and best -- order... Here's my top-line takeaway, and reading the rest of this post is really just detail. But it's detail you'll probably love if you really want to know what you missed... more

ICANN: Governance & Authority

It is almost 25 years since the Internet was privatized by the U.S. government. ICANN was formed by Esther Dyson and Jon Postel as a California-based non-profit with the responsibility to administer the Internet. However, the U.S. government retained limited control, primarily through the Internet Assigned Numbers Authority (IANA). It was the revelations, in 2013, of highly classified National Security Agency (NSA) documents by Edward Snowden that sparked global concerns over the U.S. dominance of the Internet.  more

Topics

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days