Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

A Cynic’s View of 2015 Security Predictions - Part 3

A number of security predictions have been doing the rounds over the last few weeks, so I decided to put pen to paper and write a list of my own. However, I have a quite a few predictions so I have listed them over several blog posts. After all, I didn't want to bombard you with too much information in one go! Part three examines the threats associated with data breaches. more

IPv6 a Case of Confirmation Bias

Is the glass half full or half empty? The human reflex of selective deafness to information or arguments countering one’s established believes lives on. The ISOC organized lunchtime IPv6 panel at IETF 74 in San Francisco illustrates the point... more

ICANN Policymaking Should Be Even More Transparent

Transparency and accountability are embedded in ICANN's core values. Indeed, ICANN's Bylaws mandate that "ICANN and its constituent bodies shall operate to the maximum extent feasible in an open and transparent manner ...". Public Interest Registry believes that a dedication to transparency is fundamental to the strength and continued effectiveness of ICANN's multistakeholder model. more

Reconsideration Request Denied

Having been passed over by the "old guard" Board Governance Committee of ICANN Board of Directors, I took the occasion to speak from my heart to provide the "new guard" with the observations of a 16-year ICANN volunteer. For those of you in the community who are wondering what happened, what follows is word for word what I shared with the Board of ICANN at my closed door proceedings. more

On the Success of Malware

There's often a lot of discussion about whether a piece of malware is advanced or not. To a large extent these discussions can be categorized as academic nitpicking because, at the end of the day, the malware's sophistication only needs to be at the level for which it is required to perform -- no more, no less. Perhaps the "advanced" malware label should more precisely be reattributed as "feature rich" instead. more

Global Patterns in IPv4 Allocation Statistics

In January 2007 we highlighted that the IPv4 allocation rate had increased significantly since early 2004. By 2006 it was clear that continued growth would see IPv4 exhaustion occur sometime between 2010 and 2015. In October 2010 we revisited the subject in the CircleID articled 'Graph Shows Decline of IPv4 Almost Linear'. ... Now, in January 2011, we are very close to the exhaustion of the IANA pool of IPv4 address space. more

The Business Of Domains: Shifting The Paradigm

For a business that started with few competitors and unlimited markets, the domain name registration trade has certainly become quite difficult and price sensitive. As the owner or manager of your firm, you have a basic choice to make: You can pull back and ride out this difficult period, or you can use this disruption to your advantage. Can a savvy owner or manager bring profitable growth to his or her company? One positive answer may not be in familiar spaces, but in new markets. more

WHOIS Policy at ICANN Continues to Fail

ICANN has once again acceded to the wants of contracted parties and is at risk of abdicating its duty to act in the global public interest when it comes to WHOIS policy. Its inability or unwillingness to date to reign in bad WHOIS policy, driven by contracted party interests, flies in the face of its previously-expressed policy goal “to ensure the continued availability of WHOIS to the greatest extent possible while maintaining the security and stability of the Internet’s system of unique identifiers.” more

BYOD Woes and Worries

Like the scene of a movie in which a biblical character holds back the mighty sea and is about to release the tide against his foes, BYOD has become a force of nature poised to flood those charged with keeping corporate systems secure. Despite years of practice hardening systems and enforcing policies that restrict what can and can't be done within the corporate network, businesses are under increasing (if not insurmountable) pressure to allow a diversifying number of personal devices to connect to their networks and be used for business operations. more

Bringing a Responsible Closure to the gTLD Implement Process

Last Friday ICANN released an updated new generic Top-Level Domain (gTLD) Applicant Guidebook that appears to have taken a number of positive steps toward closing the divide between the ICANN Board and the Governmental Advisory Committee (GAC). One of the more important changes to the Applicant Guidebook was the following text... more

Rodney Joffe Wins a Well-Deserved Mary Litynski Award

Every year M3AAWG gives an award for lifetime work in fighting abuse and making the Internet a better place. Yesterday at its Dublin meeting they awarded it to Rodney Joffe, who has been quietly working for over 20 years. I can't imagine anyone who deserves it more. more

With .APP, ICANN’s Auction Piggy Bank Just Got Even Bigger

ICANN reports that Google paid over $25 million for .APP in the February 25 domain auction. They were willing to bid $30M, but it's a second bid auction so that was just enough to beat out whoever the second highest bidder was. The auction proceeds piggy bank just nearly doubled from $34M to about $59M dollars, and ICANN still has no idea what to do with it. more

Phishing 2020: A Concentrated Dose of Badness

How much phishing is there? Where is it occurring, and why? How can it be reduced? I and my colleagues at Interisle Consulting have just published a new study called Phishing Landscape 2020, designed to answer those questions. We assembled a deep set of data from four different, respected threat intelligence providers and enriched it with additional DNS data and investigation. The result is a look at phishing attacks that occurred in May through July 2020. more

Bulk Sunrise Period for Special Collision List Starts Next Week

The first 12 domain registries have been scheduled for the first special Sunrise Period mandated by ICANN for trademarks on the blocked collision lists. A total of 328 new domain extensions have launched so far in 2014. Each one of these has its own unique collision list of names that were found to be already in use on private computer networks. Some of these lists have over 100,000 names. All of these registries were required to block these names from being allocated until a policy for their allocation could be developed by ICANN. more

BT and Ofcom

About 16 months ago, I heard Ed Richards of Ofcom speak at a CITI conference at Columbia, and blogged about it here. I remember thinking that Richards didn't seem to think that highspeed access to the internet was all that important. The market had to demand it, and the market wasn't being demanding. Also, he wasn't interested in government intervention to support highspeed access... more

Topics

Domain Names

Sponsored byVerisign

DNS Security

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days