Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Is ICANN Opening up Public Comment Periods in Bad Faith?

I read with interest that ICANN opened up yet another comment period on new TLDs. I believe that I speak for many when I question whether ICANN is opening up these comment periods in good faith, or instead whether these are smokescreens, mere distractions to pretend that ICANN is "listening" to the public while staff and insiders proceed with predetermined outcomes. more

A Cancerous Computer Fraud and Misuse Act

As I read through multiple postings covering the proposed Computer Fraud and Misuse Act, such as the ever-insightful writing of Rob Graham in his Obama's War on Hackers or the EFF's analysis, and the deluge of Facebook discussion threads where dozens of my security-minded friends shriek at the damage passing such an act would bring to our industry, I can't but help myself think that surely it's an early April Fools joke. more

Uncivil Society: The NETmund*al *n*t*at*ve’s Missing I’s

When I last wrote about the NETmundial Initiative (NMI) project developed by the World Economic Forum (WEF) in conjunction with ICANN it was noted that its August 28th announcement event "ended with significant dissent from the broad groups comprising "civil society", and only lukewarm support from the business sector". Indeed, during the concluding session on that late summer day, "NTIA head Larry Strickling appeared to startle the participants when he intervened to observe that perhaps the event was over-engineered... more

The Antivirus Uncertainty Principle

The antivirus industry has been trying to deal with false positive detection issues for a long, long time - and it's not going to be fixed anytime soon. To better understand why, the physicist in me draws an analogy with Heisenberg's Uncertainty Principle - where, in its simplest distillation, the better you know where an atom is, the less likely you'll know it's momentum (and vice versa) - aka the "observer effect". more

Why I Wrote ‘Thinking Security’

I have a new book out, Thinking Security: Stopping Next Year's Hackers. There are lots of security books out there today; why did I think another was needed? Two wellsprings nourished my muse. (The desire for that sort of poetic imagery was not among them.) The first was a deep-rooted dissatisfaction with common security advice. This common "wisdom" -- I use the word advisedly -- often seemed to be outdated. Yes, it was the distillation of years of conventional wisdom, but that was precisely the problem: the world has changed; the advice hasn't. more

DoT and DoH Guidance: Provisioning Resolvers

As part of a larger effort to make the internet more private, the IETF defined two protocols to encrypt DNS queries between clients (stub resolvers) and resolvers: DNS over TLS in RFC 7858 (DoT) and DNS over HTTPS in RFC 8484 (DoH). As with all new internet protocols, DoT and DoH will continue to evolve as deployment experience is gained, and they're applied to more use cases. more

Game Over for Public Whois? Article 29 Gives ICANN the Advice It Asked For

We've talked about the conflicts between our ICANN contract and privacy law in the past. Not once, not twice, but multiple times. We refused to sign the 2013 Registrar Accreditation Agreement (RAA) with ICANN until we'd received a data retention waiver. That decision probably cost us money, but if we have to choose between operating legally or illegally our path is clear. more

Connectivity Policy and the Open Internet

The goal of public policy for connectivity should be to assure access to our common facilities as a public good by adopting sustainable business models that don't put owners and users at odds with each other. Such balances are typically difficult to achieve which is what makes connectivity so unusual - we can achieve both once we fund the facilities as a public good apart from the particular applications such as telephone calls and cable content. more

Email Getting a Makeover!

The New York Times recently posted an article about how email is getting a makeover and how the communication medium is being shunned by the younger crowd as they move more and more towards other platforms. If you like using email, that means you're an old fogey. When the Internet exploded in growth in 1995, email was a pretty cool commodity. Now, it's not that big a deal anymore, according to the New York Times. more

Routing Security - Getting Better, But No Reason to Rest!

In January 2018, I looked back at 2017 to figure out how routing security looked globally and on a country level. Using the same metrics and methodology, I've recently taken a look at 2018 to see if we're making improvements. The good news is, it seems like the routing system is doing better! But there is still much work to be done. Using BGPStream.com, a great public service providing information about suspicious events in the routing system, I analyzed the number of incidents... more

Do Trade Names Qualify as Trade Marks for Purposes of the UDRP?

Naming is the first imperative. It precedes the launching of new lives as much as it does new businesses. Names secure a presence, and for businesses in the marketplace names can grow into trademarks, if they function like one. Are we not sometimes made aware that not all names are equally distinctive, and that some of them are distinctly commonplace? more

ICANN 52 Singapore - Important Issues for Brand Owners

ICANN community has a lot on its plate for 2015, and at this first full meeting of the year, we are all jumping into the work with both feet. Here are some of the main issues for brand owners: Sorting out the long-awaited transition from U.S. Government oversight to a truly multi-stakeholder model of governance; ensuring Registrant data (Whois) accuracy, accessibility and privacy (where appropriate); launching reviews of the new gTLD program; and protecting/preserving the robust business and brand voices in the process. more

The Proliferation of Microtrenching

There is an interesting new trend in fiber construction. Some relatively large cities are getting fiber networks using microtrenching. Just in the last week, I've seen announcements of plans to use microtrenching in cities like Mesa, Arizona, and Sarasota Springs, New York. In the past, the technology was used for new fiber networks in Austin, Texas, San Antonia, Texas, and Charlotte, North Carolina. more

Web Application Delivery: The Challenge of Managing Thousands of Web Applications in the Cloud

Cloud Computing is a hot topic. Some say it is already here, most agree that it will be much bigger in the coming years. It is pushed forward by the economic benefits of virtualization and consolidation. Take a heterogeneous data center, full of many kinds of servers, running a myriad of applications and consolidate it into a uniform farm of virtual machines, where each application is services by one or more VMs and you have a cloud, what is called a private cloud. more

This COVID-19 Crisis Proves the Internet Is Indeed a Caribbean Right

The coronavirus pandemic has, in the most emphatic way, shown us all just how interconnected everything and everyone is. A worldwide race is underway to minimize human interactions in order to avoid a global catastrophe. The inescapable consequence of these initiatives is an unprecedented shut down of the local, regional and global economy. The latest cost estimate to save the global economy is now at $7 trillion and climbing. more

Topics

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days