Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Judge Kocoras Cuts Down $11MM Award Against Spamhaus to $27,000 - e360 v. Spamhaus

e360 v. Spamhaus is one of these cases that's been around so long it feels like an old friend. A few years ago, e360 got some press for winning an eleven million dollar damage award against Spamhaus. In a less heralded development, following a bench trial on damages, last week a district judge modified e360's damage award down to only $27,000 on its tortious interference and defamation claims. more

Report on the Eve of WCIT

Hello, from Dubai where the WCIT (World Conference on International Telecommunications) - under the auspices of the United Nations agency, the International Telecommunications Union (ITU) - is set to get underway... There is a great deal of jockeying for position taking place, and it is interesting to walk through the corridors and listen to what is going on. more

Unintended Benefits of Trump’s Twitter Tantrum

Four years ago, progressive intergovernmental organizations like the European Union became increasingly concerned about the proliferation of hate speech on social media. They adopted legal mechanisms for removing Twitter accounts like Donald Trump's. The provisions were directed at Facebook, Twitter, and YouTube. In June of 2016, a "deconstruction" of these mechanisms was presented to one of the principal global industry standards bodies with a proposal to develop new protocols to rapidly remove such accounts. more

Website Usage Analysis in the New gTLDs

A recent study, by EURid and the Leuven Statistics Research Centre, set out to better understand the most common usage of websites that are linked to domains, and we thought it would be an interesting exercise to extend similar analysis to the new gTLD market. So, we analyzed all second-level domains registered in new gTLDs according to published zone files on June 29, 2014.  more

BYOD Woes and Worries

Like the scene of a movie in which a biblical character holds back the mighty sea and is about to release the tide against his foes, BYOD has become a force of nature poised to flood those charged with keeping corporate systems secure. Despite years of practice hardening systems and enforcing policies that restrict what can and can't be done within the corporate network, businesses are under increasing (if not insurmountable) pressure to allow a diversifying number of personal devices to connect to their networks and be used for business operations. more

Today’s Internet: More BRICS Than Westerners

Something over 55% of landline broadband users are in the "Global South," about 500M. The South is about 65% if you include "wireless-only" many of which are 4G LTE at ten megabits or more. The gap is widening rapidly and will increase by well over 70M in 2018. Six large developing countries are growing 5% or more in the last year, compared to only one in the developed world. China is adding ~30M more each year. Most developed countries are between 75% and 95% connected. That leaves little room for growth. more

Anti-Consumer ICANN Can Not be Trusted To Protect Domain Registrants’ Property Interests

Domain name registrants who purchase a name in any of the present or pending generic (gTLD) top level domains should think twice before entrusting a domain name property interest to ICANN, even though ICANN levies a money tariff on each domain registration. ICANN has no policy language that indemnifies domain name registrants. ICANN language does not even contemplate the possibility of domain theft by an ICANN registrar. more

Hiding in Plain Sight: Post-Breach

The majority of network breaches begin and end with the installation of malware upon a vulnerable device. For the rest, once that initial malware beachhead has been achieved, the story is only just beginning. The breach disclosures that make the news are often confusing as they're frequently compiled from third-hand reports, opinions and technical assumptions. More often than not, they include a discussion about the malware - how advanced it was, etc. - and whether any 0-day vulnerabilities were likely used by the mysterious attacker. more

The Draw: ICANN and a Severe Case of Virus Infection

I propose calling it Values Disorder Syndrome (VDS). It is a virus affecting groups of people. Though rational as individuals, sufferers acting in groups display an inexplicable addiction to the thrill of impunity. That behavior is totally irrational and unrelated to any perspective of gain or purpose... It is certainly a virus, and we know it goes around in ICANN circles. The proof is that the ICANN board has caught it. more

The FCC Robocall Proceeding: International Insularity

In March of this year, the Federal Communications Commission (FCC) adopted an initial Notice of Inquiry (CG No. 17-59) to mitigate robocalls. In July, it adopted a Second Notice. Mitigating spoofed telephone calls is a global problem which every country in the world has been addressing as part of a global ecosystem for many years in intergovernmental and industry bodies, in academic R&D and patent filings, and industry products with ongoing activity continuing today. more

Why This Domain Expert Has Stopped Talking About Domain Names

I'm lucky enough to spend my working life helping some of the world's largest brands drive their .brand TLD projects. The excitement and the challenges of this space stem largely from the fact that this is a new innovation; and when you're working with something truly groundbreaking, naturally there's an element of "learning as you go." And I'm not afraid to admit, sometimes we get things wrong. more

A Journey Into the Surreal: The GOP Protecting “Internet Freedom” With 25 Friends

Few people would suggest that much of the life in the U.S. national political scene these days has any nexus to the real world. At national election time, the disconnect and hyperbole in Washington get worse. "Unhinged" seems to be a common term. The recently released GOP platform on "protecting internet freedom" followed up by the "twenty-five advocacy groups" letter to Congressional leaders is definitely an unhinged a journey into the land of the clueless. more

Industry Structure at the Core of WCIT Problems

At the WCIT in Dubai it is interesting to follow the debates surrounding the many issues being addressed at this world congress. There are the issues of internet governance in the broadest sense of the word - these have received widespread attention. But if we look at the core issues that an organisation such as the ITU can address then the scope widens - to topics such as the rules for the International Telecommunications Regulations (ITRs), and particularly those in relation to the rules for rates and charges. more

IGF-USA Teaser. Laura DeNardis: The Internet in Everything

Dr. Laura DeNardis, Professor and Interim Dean of the School of Communication at American University and a Faculty Director of the Internet Governance Lab, is a featured panelist at this week's IGF-USA conference. In advance of the event, I would like to draw attention to her sixth book: The Internet in Everything. Freedom and Security in a World with no Off Switch. This treatise is one of those "should/must-reads" that come along from time-to-time as it focuses on a critical issue that is overlooked by either design or neglect: how digital infrastructure determines policy. more

Innovation and Cybersecurity Regulation

The market has failed to secure cyberspace. A ten-year experiment in faith-based cybersecurity has proven this beyond question. The market has failed and the failure of U.S. policies to recognize this explains why we are in crisis. The former chairman of the Security and Exchange Commission, Christopher Cox, a longtime proponent of deregulation, provided a useful summary of the issue when he said, "The last six months have made it abundantly clear that voluntary regulation does not work."... more

Topics

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days