Doug Isenberg notes in a recent CircleID essay that two records in domain name disputes were broken in 2017, namely number of cybersquatting claims (3,036 in 2016, 3,073 in 2017) and number of domain names implicated (5354 in 2016, 6370 in 2017). Fairly consistently from year to year, approximately twenty percent of filings are terminated (withdrawn): whether by settlement or nolo contendere we don't know. (All of these statistics come from the World Intellectual Property Organization (WIPO). more
Nomulus is the code for the backend domain name registry solution offered by Google which requires the use of Google Cloud. This solution is the one used for all of Google's new gTLDs and the solution works. An announcement for this solution can look like a potentially "simple" solution for future .BRAND new gTLD applicants, but is it truly the case? more
There is no network security technology more ubiquitous than the firewall. With nearly three decades of deployment history and a growing myriad of corporate and industrial compliance policies mandating its use, no matter how irrelevant you may think a firewall is in preventing today's spectrum of cyber threats, any breached corporation found without the technology can expect to be hung, drawn, and quartered by both shareholders and industry experts alike. more
DMARC is an anti-phishing scheme that was repurposed in April to try to deal with the fallout from security breaches at AOL and Yahoo. A side effect of AOL and Yahoo's actions is that a variety of bad things happen to mail that has 'From:' addresses at aol.com or yahoo.com, but wasn't sent from AOL or Yahoo's own mail systems. If the mail is phish or spam, that's good, but when it's mailing lists or a newspaper's mail-an-article, it's no so good. more
ICANN have taken a solid stance in regards to contention sets, with those yet to be resolved soon to be forced into auctions of last resort in the coming months. As expected, this has increased the velocity of private settlements between applicants, either via deals or private auctions. It seems like most applicants (wisely) don't want to see their funds going into ICANN coffers unnecessarily. more
There's a peaceful feeling in the air at ICANN's meeting this week, and I think it has something to do with being here in Costa Rica. Speaking at today's opening ceremony, Costa Rican President Laura Chinchilla described how, back in 1948, her country became the first to willingly go without any kind of armed forces for national defense. In that respect, Costa Rica is a lot like ICANN: alone in a hostile world with only its constituents and allies for protection. more
Here are my VoIP and Voice security predictions for 2009, limited to just a few, key predictions... The poor economy will slow the adoption rate for VoIP and Unified Communications (UC). This will continue to limit the size of the enterprise VoIP deployments for potential hackers to exploit. VoIP/UC will continue to be mostly an internal/campus application where the threat level for attack is low, so deployments will be largely secured along the same lines as other data network applications. more
In the wake of the election, sweeping policy shifts in the information economy are set to accelerate. Expect fast-tracked FCC reforms, Starlink subsidies, and AI-driven oversight to redefine media, tech, and regulatory landscapes. From relaxed antitrust to intensified media control, these eleven reversals signal a move toward deregulation and Chicago School libertarianism, with lasting impacts on U.S. markets and governance. more
Starting last week there have been a number of sensational headlines about IPv6 user adoption using adjectives and phrases like, "explodes", "skyrocketing" and "conquering the world". Nice to hear for sure but what does that mean to vendors of IPv6 gear or anyone else studying the market? more
The global debate on Internet Governance has come a long way since 2005. In the 12 years following the World Summit on the Information Society (WSIS) in Tunis, governments have paid more attention than ever to policies that can promote economic development, security, and innovation. You may not have felt the progress, however; if it is hard to see a reduction in the confusion and "soup of forums" described on this site nearly six years ago, this is because as we have made progress, the scope of the issues addressed have increased to match. more
A British perspective on a very American process... As a new member of the the "Tech Elders", I was invited to join yesterday's hearing in Washington, DC on the reclassification of broadband Internet access services. The US Federal Communications Commission (FCC) has decreed that Internet access should switch from being lightly regulated as an 'information service' (Title I) to a more heavily regulated as 'telecommunications service' (Title II). I'd first like to say that the process and content was a credit to the rule of law in the United States. more
While a great deal of attention has recently been paid to the enormous amount of change that is taking place at the edge of the network with smartphones, tablets, apps, Web2.0 etc, massive changes are also underway on the network side. The current network has been designed over a period of thirty years and it is due for a serious overhaul to keep abreast of changes in the industry in general. more
Three months ago, I pondered the question Would the Internet Survive a Trump Apocalypse? As improbable as that outcome was in August, enough of the American electorate has "pulled the pin" to bring it on. It is a brave new world -- distinctly darker and more uncertain. At the moment, the Trump team is trying to figure out how to manifest their vacuous invectives masquerading as policy. The world is watching, and Washington looks like the scene in Ghostbusters where the containment grid has just been turned off, and the demonic ghosts are rising from the underbelly of K-Street. The result here is a Washington lobbying dream -- a result rather different than that promised to naïve Trump devotees. more
As with any high-stakes event, elections have become a prime target for cybercriminals seeking to exploit public trust through impersonation, misinformation, and scams. CSC's comprehensive research about the 2024 U.S. Election reveals the alarming role of dormant domains, which have the potential to be exploited for launching cyber attacks against political campaigns, organizations, and constituents. more
Unfortunately, no matter what else the stimulus bill may or may not have done, it's slowed down the rate of broadband deployment in the US over the last year. The Rural Utility Service (part of the US Agriculture Department) and NTIA (part of the US Commerce Department) have awarded only 15% of the first round money they promised to make available. To be blunt, they failed in their mission. more
Sponsored byCSC
Sponsored byVerisign
Sponsored byRadix
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byIPv4.Global