Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

One Big Cheer for ICANN - But Still a Way’s from Our “Gooool”

As we approach the World Cup in South Africa this June it's heartening to see the amount of attention being paid to the continent. As with ICANN's recent Nairobi meeting, the eyes of the world are focusing on Africa in a new way -- as a sophisticated marketplace, and as a destination for investment, technology, and yes, sports... Still, as we prepare for the Cup and as we celebrate ICANN's recent approval of more Internationalized Domain Names (IDNs), our job as an Internet community remains unfinished. Too many scripts and thus too many key voices remain "off the pitch". more

M3AAWG and APWG Do the Best Survey Yet on WHOIS Redaction

M3AAWG, the Messaging, Malware, and Mobile, Anti-Abuse Working Group and APWG, the Anti-Phishing Working Group, surveyed their members about recent WHOIS changes. With over 300 results from security researchers, it's the broadest report yet on WHOIS use. The survey results confirm our concerns that WHOIS was a vital resource for security research, and its loss is a serious and ongoing problem. more

The International Space Station’s Canadian Music Video Collaboration - and Google+ Hangout

As much as we talk here about the inner workings of the Internet's infrastructure, there are times when you have to just sit back and look at how incredibly cool some of the things are that are enabled by the Internet. For example, last week I was delighted to stumble across this excellent music video collaboration between the International Space Station's Canadian commander Chris Hadfield, the Canadian band Barenaked Ladies along with a Canadian student choir. more

F2C: My Opening Remarks

Here are my opening remarks at F2C: Freedom to Connect yesterday: "I am honored to be among so many remarkable people. We have to be remarkable people, because we have a hell of a job to do. The Internet has been given to us. It is a miraculous gift, and a boon to our lives... at least in part because it accidentally matured outside the purview of profit and loss. Now the money has arrived. If you want to see what happens when the money arrives, look at Nigeria or Venezuela or Russia or Iraq..." more

The State of RPKI as We Enter 2022

Resource Public Key Infrastructure (RPKI) is a method to secure internet routing traffic by cryptographically verifying routes. As we begin 2022, we look back at 2021 and see how the year saw another significant step towards its adoption. High-profile issues with the old trust-based model of Border Gateway Protocol, designed several decades ago, have shown the continued importance of protecting popular networks from mistakes or hackers. more

Independence is New gTLD Compatible

Independence must be a fashion of the moment. Cataluña, a place where I've lived, is fighting hard to be independent and, even if I don't believe a second that this will ever happen, it is a common example of a community which fought hard, very early and by all means, to operate a new gTLD to clearly identify its culture (and Nation) on the Internet: the .CAT Top-Level domain. Note that this TLD has nothing to do with the .DOG nor .PET new gTLDs (joke). more

New Generic Top Level Domain (gTLD) Application Reveal Targets June 13, But Many Questions Remain

Even though ICANN is moving full steam ahead with the New gTLD Program, many of the program's specifics are still being finalized. Many important questions related to the Trademark Clearinghouse and the Uniform Rapid Suspension (URS) still remain unanswered at this point. However, ICANN has recently provided additional details around Application Reveal and Batching and selected the Independent Objector. more

Encryption, Our Last Line of Defense

Encryption is fundamental to our daily life. Practically everything we do online makes use of encryption is some form. Access to our financial transactions, health records, government services, and exchanged private messages are all protected by strong encryption. Encryption is the process of changing the information in such a way as to make it unreadable by anyone except for those possessing special knowledge (usually referred to as a "key"), which allows them to change the information back to its original, readable form. more

ICANN 51: Los Angeles - Getting Ready for a Big 2015

Earlier this month, the Internet Corporation for Assigned Names and Numbers (ICANN) held its 51st public meeting in Los Angeles. Once again, MarkMonitor joined stakeholders from across the globe to discuss issues ranging from government control over the Internet, to key lessons learned thus far from the new gTLD rollout. This coming year promises to be a big one for ICANN, and for the business and brand community as a result. more

Network Security: How Attackers Gain Access from Inside

Most people - mistakenly - believe that they are perfectly safe behind a firewall, network address translation (NAT) device or proxy. The fact is quite the opposite: if you can get out of your network, someone else can get in. Attackers often seek to compromise the weakest link in a network and then use that access to attack the network from the inside, commonly known as a "pivot-and-attack." more

Smells like Cybersquatting? How the UDRP “Smell Test” Can Go Awry

The UDRP has the form of a substantive Policy, but it operates as a "smell test".1 If the evidence smells bad, the panel will likely order a transfer. If it doesn't, the panel won't. An aim of this article is to help improve UDRP panels' sense of smell when it comes to differentiating between domain name investors and cybersquatters. I will provide some insight into the business of domain name investing that I hope will be helpful to UDRP panelists in making more accurate inferences in disputes involving investors. more

Why More Registries Should Be Talking About DNS Security

I've been incredibly lucky in my time at Neustar to lead both the exceptional Registry and Security teams. While these divisions handle their own unique product and service offerings, it's clear that they have some obvious crossovers in their risks, opportunities and challenges. Having been closely involved in the strategy of both these teams, it strikes me that there is more we as Registry Operators and service providers can and should be doing to align the world of cybersecurity with that of domain names. more

From Connectivity to Sustainability: The Role of Internet Governance in Realizing the SDGs

In the digital era's transformative landscape, the intersection of Internet Governance and Sustainable Development emerges as a focal point for global discourse. It is widely recognized that the Internet, in its vast potential, holds the key to unlocking solutions for many of the challenges we face. However, this potential could be significantly underutilized, or worse, lead to adverse effects without a robust governance framework. more

Can Mobile Operators Afford a Mobile-Only Strategy?

With 4G rollouts in many developed mobile markets reaching completion, it might be time to check the balance of the state of the mobile industry. Looking at campaigns around the world it is clear that what you see are 'me too' strategies. The advertising campaigns and the marketing hyperbole around them might suggest that a particular operator has now done something unique or very special, but if one looks beyond the advertising blurb it is clear that the campaign is nothing new and/or that what is on offer can be very easily matched by their competitors in the market. more

Second House Amendment Ups the Stakes on IANA Transition

The House of Representatives has passed another measure related to the proposed IANA functions transition, and has again attached it to "must pass" legislation. This move ups the ante and may well be the final straw that compels the Senate Commerce Committee to hold its own oversight hearing on the IANA transition proposal.On May 30th the House adopted the Duffy Amendment to the Appropriations bill funding the Commerce, Justice, and State Departments in FY 2015. The final vote on the amendment was 229 in favor and 178 opposed -- it was fairly partisan outcome, with only ten Democrats voting aye while just one Republican voted nay. more

Topics

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days