Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

The DNSSEC Groundswell

It's been 15 long years since the standard for DNSSEC was developed and sadly adoption has been painfully low until recently, thanks to Dan Kaminsky, the infamous Internet Researcher who indentified that gaping hole in the DNS. The discovery of the fundamental flaw in DNS sparked industry wide attention! Every day, we move a little closer to widespread DNSSEC adoption, so I thought I'd take a moment and highlight some of the most notable milestones... more

ICANN in Hollywood: Foreshadowing a Happy Ending?

As we arrived in Hollywood -- the land of happy endings -- ICANN had just given us cause to hope that the ICANN accountability process might get its own Hollywood ending, despite a fitful start. As one who's been critical of ICANN management's heavy-handed attempts to control the accountability process, it's only appropriate to give credit where credit is due. In accepting the community's strenuous -- and nearly unanimous -- calls for a cross-community working group to lead the process of improving ICANN's accountability mechanisms, ICANN management says it's now prepared to follow the community's lead, rather than dictating and constraining it. more

FCC Vote Results: We the People Won

The Federal Communications Commission (FCC) has just voted to open up the so called TV Whitespaces for UNLICENSED use. This is incredibly good news for rural America in particular but actually for all of America. It's not as important as the election the rest of us in the US voted in today -- but this action is a very, very big deal. Just a few of the benefits... more

The Incredible Value of Passive DNS Data

If a scholar was to look back upon the history of the Internet in 50 years' time, they'd likely be able to construct an evolutionary timeline based upon threats and countermeasures relatively easily. Having transitioned through the ages of malware, phishing, and APT's, and the countermeasures of firewalls, anti-spam, and intrusion detection, I'm guessing those future historians would refer to the current evolutionary period as that of "mega breaches" (from a threat perspective) and "data feeds". more

Rings of Fire

Rightfully, Olympic is a very sacred word and a very pure concept for the Olympic Committee as they have protected this brand and all of its related intellectual property components at every instance for about hundred years. However, the word Olympic as a name is geographic based on Mount Olympus and over the many centuries belonging to the public domain. ... Dot-Olympic ideally should belong to the Olympic committee, if they so desire, but in a contest or any other situation the ownership of this name would simply become a question of going after a diluted geography based public domain name. more

Starlink Promising Satellite Cellular Service: A Possible Game-Changer for Remote Areas and Outdoor Enthusiasts

Starlink recently launched a new webpage that advertises the future ability to deliver text, voice, and data to 4G cell phones via satellite. The texting service is supposed to be available in 2024, with voice and data coming in 2025. The service will require a user to have a view of the open sky. more

Are You Ready for the Mobile Revolution?

If there is one fundamental trend everyone can agree on in technology circles, it's the move to mobile. More and more online traffic is originating not from PCs, but from smart mobile devices. You can pick your research study to confirm -- recently I read that Tony White of Ars Logica is projecting that by next year 50% of all web traffic will be generated by mobile devices. That may be aggressive, but you get the idea. more

The Dotcom Kingdom

What will happen to dotcom once a thousand generic Top-Level Domain (gTLD) applications were approved and start to skate around on global cyber platforms? Nothing, firstly, there are over 200,000,000 dotcoms while these 1000 exotic high profile gTLD will not even make a scratch to the dotcom market. Secondly, a dotcom is about $10 plus while gTLD is $500,000 plus... After all gTLD are never supposed to be for everyone, as they can only be fitted to right and very special combinations. more

Building a Secure Global Network

Recently, the DNS has come under an extensive attack. The so-called "DNSpionage" campaigns have brought to light the myriad methods used to infiltrate networks. These attacks employed phishing, system hopping via key exfiltration, and software zero day exploits, illustrating that many secure networks may not be fully protected. more

Death of Transit: A Need to Prevent Fragmentation

Way back in the olden days, folks decided that cities should invest lots of money in public transportation systems. The reasons were many fold, including reducing the number of individual vehicles being driven in too, and parked in, congested "downtown" areas, and increasing traffic to businesses in those areas, increasing their commercial viability. Many of these systems are sold to the public with the idea that they will (at least) break even against capital and operational expenses over time, but the reality is far different. more

Developing the Next Generation of Internet Champions – Internet Society’s Early Career Fellowship

How do we help develop the next generation of champions for an open Internet? As many of us who were involved in the early years of the Internet are getting older, how do we help inspire a new wave of advocates for an open Internet available to everyone? As we face so many threats to "the Internet way" from many different forces - governments, corporations, criminals, and other organizations - how do we help build the corp of people who understand Internet technology and policy issues and can help shape the future of this Internet we have all come to rely on? more

NTIA on IoT - ICANN 2? And Reconsidering IoT as Distributed Process Control

NTIA has published a Notice for Public comment that is titled "The Benefits, Challenges, and Potential Roles for the Government in Fostering the Advancement of the Internet of Things". This could become ICANN-2, bigger, longer, and uncut; and with a much greater impact on the future direction of the internet. However, my thoughts on this go well beyond the possibility of another ICANN. more

Security and Reliability: A Closer Look at Vulnerability Assessments

Building on my last article about Network Assessments, let's take a closer look at vulnerability assessments. (Because entire books have been written on conducting vulnerability assessments, this article is only a high level overview.) What is a vulnerability assessment? more

Helping Haiti: The Email Community Response

It is inconceivable that anyone within viewing distance of a television or computer screen this week doesn't know about the disaster in Haiti. As of this writing, 50,000 bodies have been collected from the streets of Port-au-Prince. Millions of people, a number our brains simply aren't equipped to deal with, are now homeless. Help is needed now, and will be, for a very long time. more

No Time Bar for Cybersquatting Claims Under UDRP

Headline in TheDomains.com, June 18, 2016: "Wow: 20 Year Old Domain Name WorldTradeCenter.com Lost in UDRP." For those who don't follow UDRP decisions carefully this may elicit, how can this be? Well, surprised or not, and assuming complainant has priority in the string of characters that is both a domain name and a trademark... delay is not a factor in prevailing on cybersquatting claims when there is an alignment of other factors... more

Topics

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days