Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Closing in on the Google Hackers

Joseph Menn has an article on CNN.com wherein the crux of the story is that US experts are closing in on the hackers that broke into Google last month. It is believed by some that the Chinese government sponsored these hackers. China, naturally, denied involvement. My own take is that tools today are sophisticated enough such that you don't necessarily need state sponsorship in order to launch a cyber attack. more

How to Make DNS Green

The Dutch Internet registry SIDN has launched a unique program in partnership with CleanBits to identify what proportion of .nl domain names were hosted on a green or CO2-neutral basis. The results show a strong trend towards the 'greening' of the .nl internet zone. Nearly 30 per cent of .nl names were found to have green hosts. more

The Danger of Weaponising the DNS in the Ukraine Russia Conflict and Good News

As we watch the Ukraine and Russia conflict over boundaries and territories, I chanced upon a YouTube video showing the region of Europe and how, for the last 1000 years, national boundaries and names of nations have changed where in 1142, you had nations like Muslim Spain, Kievan Rus. In 1143 the Kievan Rus included modern-day Ukraine and Crimea, and in 1163 bulk of Central and Southern Europe was the Holy Roman Empire... more

Is the FCC Inviting the World’s Cyber Criminals into America’s Living Rooms?

In October 2012, the Chairman and Ranking Member of the House Intelligence Committee issued a joint statement warning American companies that were doing business with the large Chinese telecommunications companies Huawei and ZTE to "use another vendor." The bipartisan statement explains that the Intelligence Committee's Report, "highlights the interconnectivity of U.S. critical infrastructure systems and warns of the heightened threat of cyber espionage and predatory disruption or destruction of U.S. networks if telecommunications networks are built by companies with known ties to the Chinese state, a country known to aggressively steal valuable trade secrets and other sensitive data from American companies." more

Sharing: The First Step to Structural Change in Mobile

The arrival of the iPhone, Android and iPad will raise the stakes higher in the mobile broadband market. The fact that iPhone alone has over 140,000 Apps over sort of open networks, not portals, shows the demand for mobile applications. This will put an enormous strain on the infrastructure of the mobile operators and will require them to build fibre networks to all mobile stations, as well as invest in more spectrum and new technologies such as LTE. At the same time the mobile subscriber markets are becoming saturated and competition is driving margins down. more

Today’s CISOs Are Contending With Oft-Changing Disclosure Standards

When it comes to breach disclosures, today's chief information security officers (CISOs) are struggling with an especially turbulent regulatory environment. Security teams are understaffed, and systems are more extensive, making them harder to monitor and defend, while threats are becoming more sophisticated, more frequent, and more varied. It's at precisely this difficult juncture that regulations and enforcement are rapidly changing, leaving CISOs feeling like they are running up the down escalator. more

America Closing Down Its Copper Network - So What’s Next?

We have reported in the past on the rapid decline of the copper telecoms network in the USA. A decade ago BuddeComm predicted that it would be impossible to move two customer access networks in parallel towards the new fibre future, the one operated by the telcos and the other operated by the cable companies. At that stage we indicated that a possible outcome could be that the telcos would upgrade their networks to FttH and that the cable companies would become the key tenants on that network. more

New Book Released: International Domain Name Law, ICANN and the UDRP

A new book by David Lindsay, an academic at Monash University's Law School and a widely published expert on internet law, intellectual property law and privacy, has recently been published. ...In this path-breaking work the author examines the extent to which principles of national trade mark law have been used in UDRP decisions. It will be essential reading for anyone, whether academic or practitioner, interested in internet law, intellectual property, and e-commerce law. more

A Look at Why Businesses Buy Cloud Services?

If you are a cloud provider, whether you are pure play or an internal IT department, it is very interesting to know who is buying cloud services, and why. In a recent survey by PB7 sponsored by EuroCloud Netherlands and others, a group of Dutch companies was interviewed about their motivations and hesitations around cloud computing. The survey's results were quite a bit more interesting than the usual lot. In this article I have cherry picked a few observations from the larger survey. more

How Open Cloud Could Have Saved Sidekick Users’ Skins

The cloud computing scandal of the week is looking like being the catastrophic loss of millions of Sidekick users' data. This is an unfortunate and completely avoidable event that Microsoft's Danger subsidiary and T-Mobile (along with the rest of the cloud computing community) will surely very soon come to regret. There's plenty of theories as to what went wrong -- the most credible being that a SAN upgrade was botched, possibly by a large outsourcing contractor, and that no backups were taken... more

Deadline of April 10 to Apply For CARIS Workshop on Coordinating Response to Internet Attacks

You have just a couple of days to either complete a survey or submit a paper to join the "Coordinating Attack Response at Internet Scale (CARIS)" Workshop happening on June 19, 2015, in Berlin, Germany... If you are interested in helping improve the overall security and resilience of the Internet through increased communication between the groups responding to the large-scale attacks happening on the Internet every day, I would strongly encourage you to apply! more

National Broadband, Leadership or Procrastination

There is no doubt that any national infrastructure plan of the magnitude of national broadband networks as they are currently rolled out in 9 countries and which policies have been put in place in another 110 countries will have questions attached to it. Furthermore, this infrastructure is being developed for the digital economy, which, in itself, is a fast-moving world. Five years ago there were no smartphones, tablets, mobile apps or smart TVs. more

Is It Time for a Breakthrough in Securing Cyberspace?

This year in July gen. Keith Alexander, director of the National Security Agency and head of the US Cyber Command participated at DefCon, the hackers conference in Las Vegas. In his address, gen. Alexander said, among other things, "This is the world's best cybersecurity community. In this room right here is the talent our nation needs to secure cyberspace."... As someone, who is regularly meeting the top Russian cyber folks, I already know (unofficially, of course) how the words of gen. Alexander were met in Moscow. more

Mobile Broadband in Africa and the GCC Countries

The story of the growth of pre-paid mobile voice and SMS in Africa and the countries of the Gulf Cooperation Council is well known. The challenge is to move to mobile broadband, which is seen as having potentially explosive growth. Operators will need to create new value propositions, they face significant internal challenges and risk being displaced by rivals moving faster or better able to understand and meet the needs of customers... more

The Online World Is Not Flat: The Need for Geo gTLDs

This post outlines location factors that make the online world not as flat as some have claimed. I then outline the impact of these factors on the demand for new gTLDs. Domain names can signal geography by means of country-code Top Level Domains (ccTLDs) and new generic TLDs (gTLDs). Location is back in the spotlight for reasons laid out by Professor David R. Bell of the Wharton School in his recent book. more

Topics

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

DNS Security

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days