Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

The ICANN Registrar Community

It started way back in 1993 with a Cooperative Agreement with the US Government and Network Solutions, making them registrar 'numero uno'. At that time, they enjoyed a monopoly of the market and the much envied ability to charge $70 for a 2 year registration. As all good things come to an end (for NetSol), the agreement was amended in October 1998 to introduce a more competitive spirit. more

How Dormant Domains Can Be Weaponized During Events Like the 2024 U.S. Election

As with any high-stakes event, elections have become a prime target for cybercriminals seeking to exploit public trust through impersonation, misinformation, and scams. CSC's comprehensive research about the 2024 U.S. Election reveals the alarming role of dormant domains, which have the potential to be exploited for launching cyber attacks against political campaigns, organizations, and constituents. more

Exploiting the Firewall Beachhead: A History of Backdoors Into Critical Infrastructure

There is no network security technology more ubiquitous than the firewall. With nearly three decades of deployment history and a growing myriad of corporate and industrial compliance policies mandating its use, no matter how irrelevant you may think a firewall is in preventing today's spectrum of cyber threats, any breached corporation found without the technology can expect to be hung, drawn, and quartered by both shareholders and industry experts alike. more

The Proliferation of Microtrenching

There is an interesting new trend in fiber construction. Some relatively large cities are getting fiber networks using microtrenching. Just in the last week, I've seen announcements of plans to use microtrenching in cities like Mesa, Arizona, and Sarasota Springs, New York. In the past, the technology was used for new fiber networks in Austin, Texas, San Antonia, Texas, and Charlotte, North Carolina. more

Lawful Registrations of Domain Names

Doug Isenberg notes in a recent CircleID essay that two records in domain name disputes were broken in 2017, namely number of cybersquatting claims (3,036 in 2016, 3,073 in 2017) and number of domain names implicated (5354 in 2016, 6370 in 2017). Fairly consistently from year to year, approximately twenty percent of filings are terminated (withdrawn): whether by settlement or nolo contendere we don't know. (All of these statistics come from the World Intellectual Property Organization (WIPO). more

A Q&A on Google’s New gTLD Solution, Nomulus

Nomulus is the code for the backend domain name registry solution offered by Google which requires the use of Google Cloud. This solution is the one used for all of Google's new gTLDs and the solution works. An announcement for this solution can look like a potentially "simple" solution for future .BRAND new gTLD applicants, but is it truly the case? more

IPv6 Basking in the Desert Sun

Tuesday June 29th at the Cisco Live Conference Las Vegas, John Chambers announced their newest product, the Cius tablet aimed at the enterprise market and positioned as a mobility product. That very same day a two hour IPv6 deployment panel, moderated by Cisco's Alain Fiocco, featured Google, Microsoft, Comcast and Tata Communications in front of a room filled to near capacity. The nature of the audience was interesting. Compared to previous years, when asked about their affiliation, the number of hands raised for the category 'enterprise' was significantly higher. more

What’s the ROI on a $20m TLD Auction?

ICANN have taken a solid stance in regards to contention sets, with those yet to be resolved soon to be forced into auctions of last resort in the coming months. As expected, this has increased the velocity of private settlements between applicants, either via deals or private auctions. It seems like most applicants (wisely) don't want to see their funds going into ICANN coffers unnecessarily. more

VoIP Security Predictions for 2009

Here are my VoIP and Voice security predictions for 2009, limited to just a few, key predictions... The poor economy will slow the adoption rate for VoIP and Unified Communications (UC). This will continue to limit the size of the enterprise VoIP deployments for potential hackers to exploit. VoIP/UC will continue to be mostly an internal/campus application where the threat level for attack is low, so deployments will be largely secured along the same lines as other data network applications. more

A Field Guide to Internet Governance in 2017

The global debate on Internet Governance has come a long way since 2005. In the 12 years following the World Summit on the Information Society (WSIS) in Tunis, governments have paid more attention than ever to policies that can promote economic development, security, and innovation. You may not have felt the progress, however; if it is hard to see a reduction in the confusion and "soup of forums" described on this site nearly six years ago, this is because as we have made progress, the scope of the issues addressed have increased to match. more

The Appeal Against Broadband Reclassification

A British perspective on a very American process... As a new member of the the "Tech Elders", I was invited to join yesterday's hearing in Washington, DC on the reclassification of broadband Internet access services. The US Federal Communications Commission (FCC) has decreed that Internet access should switch from being lightly regulated as an 'information service' (Title I) to a more heavily regulated as 'telecommunications service' (Title II). I'd first like to say that the process and content was a credit to the rule of law in the United States. more

IPv6 Market Has Liftoff - Now the Hard Part Begins

Starting last week there have been a number of sensational headlines about IPv6 user adoption using adjectives and phrases like, "explodes", "skyrocketing" and "conquering the world". Nice to hear for sure but what does that mean to vendors of IPv6 gear or anyone else studying the market? more

Costa Rica, ICANN, and Nonviolent Governance

There's a peaceful feeling in the air at ICANN's meeting this week, and I think it has something to do with being here in Costa Rica. Speaking at today's opening ceremony, Costa Rican President Laura Chinchilla described how, back in 1948, her country became the first to willingly go without any kind of armed forces for national defense. In that respect, Costa Rica is a lot like ICANN: alone in a hostile world with only its constituents and allies for protection. more

Intune Collapses the OSI Model

While a great deal of attention has recently been paid to the enormous amount of change that is taking place at the edge of the network with smartphones, tablets, apps, Web2.0 etc, massive changes are also underway on the network side. The current network has been designed over a period of thirty years and it is due for a serious overhaul to keep abreast of changes in the industry in general. more

The Three-Character Question at the Heart of Single-Character .COMs: W-H-Y?

In the matter relating to O.COM, I've focused on the fact that VeriSign has -- in correspondence to the organization that is counter-party to its .COM and transliterated .COM IDN Registry Agreements, in earnings calls with its investors and financial analysts, and in policy published on its website for every innocent and unsuspecting Tom, Dick, and Harry in the world to be duped by -- stated an unequivocal and unwavering commitment . more

Topics

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

DNS Security

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days