Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

How Domain Data Helps Thwart BEC Fraud

It's true, domain data has many practical uses that individuals and organizations may or may not know about. But most would likely be interested in how it can help combat cyber threats, which have been identified as the greatest risks businesses will face this year. Dubbed as the greatest bane of most organizations today, cybersecurity can actually be enhanced with the help of domain data. How? more

Keeping a Free and Open Internet Starts at the Root

??Dynamics at the Internet's core erode stakeholder legitimacy and aid Sino-Russian efforts for multilateral control. ???At the beginning of what became a prolonged process for privatization, the U.S. Government established a framework of fundamental guiding principles for governance of the Internet's root. These principles were designed to work to preserve a free and open nature for a global network that was to be elastic, extensible, and – at more than two decades – enduring. more

Registry Data Quality Assessment

Accurate registration data is essential for the global registry system. To ensure that the RIPE Registry's data is correct, up-to-date and accurate, the RIPE NCC regularly checks the Registry data to fix inconsistencies and outdated information. We recently evaluated and analysed all IP address ranges registered in the RIPE Database and were pleased to find that 96.09% of those records are considered accurate. more

What COVID-19 Means for Network Security

The COVID-19 Pandemic is causing huge social and financial shifts, but so far, its impact on network security has gone under-reported. Yet with thousands of companies worldwide requiring millions of employees to work remotely, network administrators are seeing unprecedented changes in the ways that clients are using their networks and new threats that seek to leverage the current crisis. more

Critical Role for R&E Networks+Commercial Clouds in US Government “Big Data” Initiative

It is great to see US and European governments undertake initiatives to promote the development of research into Big Data utilizing commercial clouds. Many cloud providers are offering free resources to support these initiatives. R&E networks will play a critical role in linking researchers to the commercial clouds and developing collaboration platforms and portals. more

If Thou Be’st as Poor for a Subject as He’s for a King…

Way back in 1995, Wired reporter Simson Garfinkel gave Jeff Slaton the name "Spam King." Less than a year later, Sanford Wallace earned the title -- and soon had to share it (and his upstream provider) with Walt Rines. Others have come and gone; Sanford and Walt reappear every few years, together or separately, only to be sued away again... it seems as if any spammer noticed by law enforcement is immediately crowned "the Spam King," even when there are multiple such crownings happening at the same time. more

Three Kinds of UDRP Disputes and Their Outcomes

There are three kinds of UDRP disputes, those that are out-and-out cybersquatting, those that are truly contested, and those that are flat-out overreaching by trademark owners. In the first group are the plain vanilla disputes; sometimes identical with new tlds extensions (mckinsey.careers> and <legogames.online>); sometimes typosquatting (<joneslang lassale.com> and <wiikipedia.org>); and other times registering dominant terms of trademarks plus a qualifier (<pleinphilipp-shop.com> and <legostarwars2015.com>). more

China: Is It Our Cyber Defense Red Herring?

There are thousands of articles perpetuating the claim that China is out to get us on the Internet. And yet, all these discussions are begging the question, is it China attacking? Also, are they even the "usual suspects"?
While I can point to real facts of China making active use of information warfare, cyber warfare, or whatever else you choose to call it (such as the release of 0 days being patched by Microsoft and originally reported by the Taiwanese government, search Microsoft's site), I can also point to Germany (intelligence Trojan horse), the US (The Farewell Dossier) and other countries such as North Korea (without much detail, so questioned)... more

VoIP: Definitely Not Dead Yet, the Sequel

I don't usually write sequels to my articles, but this time, it's warranted. My last column, "VoIP in 2008 -- I'm Not Dead," served as a year-end review and, for me, there were a lot of interesting things in 2008 related to VoIP that formed the basis of that article. I did not intend to rattle cages, but it did, and set off a lot of subsequent conversation, primarily in the blogospheremore

When the Internet Service Provider is Government-Owned Monopoly: Cuba’s Forthcoming 3G Pricing Model

Jorge Luis Valdés Hernández, Director de Servicios Convergentes de la Vicepresidencia de Integración Comercial de ETECSA, described the forthcoming changes to their mobile Internet service in a recent press conference. (He also has a very long job title). To be honest, the press conference coverage left me a bit confused, but this is some of what he said as I understood it. more

KPN’s Focus on FttC Misses the Broader Picture

The Netherlands remains one of the few countries in Europe to have significant FttH networks. Until 2009, the main characteristic of Dutch fibre rollouts was the dominant role played by housing corporations and municipal governments. This focus changed following KPN's acquisition of a 41% stake in the fibre provider Reggefiber and the subsequent ramping-up of their efforts and investment through their joint venture Glashart. more

Call for Participation - ICANN DNSSEC Workshop at ICANN62, Panama City

Would you like to share information about how you are using DNSSEC with the wider technical community? Do you have an idea for how to make DNSSEC or DANE work better? Or work with new applications? If so - and if you will be attending ICANN 62 in Panama City, Panama from 25-28 June 2018 - then please consider sending in a proposal to participate as a speaker in the ICANN 62 DNSSEC Workshop! more

ICANN GNSO Review - Final Week for Input from Community

As the Chair of the 2014 Generic Names Supporting Organization (GNSO) Review Working Party, I have the privilege of working with 19 dedicated and passionate individuals who represent the diversity of the GNSO community. We've held numerous meetings and provided extensive input and feedback on key aspects of the GNSO Review in the short time that our group has been assembled to act as a liaison between the GNSO, the Independent Examiner (Westlake Governance Limited), and the ICANN Board Structural Improvements Committee. more

Google’s Acquisition of Nest and Smart Homes

Google's $3.2 billion acquisition of high-tech thermostat and smoke-detector maker Nest Labs will allow the company to further infiltrate people's lives, not just via their smartphones but now also via a range of home appliances. It is a logical development for the digital media giant and based on their record of innovation we can expect a range of interesting products and services, also known as machine-to-machine (M2M) communication and the Internet of Things (IoT), to enter this market. more

Are Google, Microsoft and Apple the Next Utilities in Telecoms?

Over the last few years the increasing amount of discussion about telecoms reveals that the real competition for telecoms companies is not from other telcos, but companies such as Google and others. While I agree with this, obviously it is important to analyse it further. more

Topics

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days