Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Tackling Cyber Security: Should We Trust the Libertarians? Part 2

A couple of months ago, I wrote a post posing the question of whether or not more government regulation is required in order to secure the Internet. On the one hand, anonymity is viewed in the west as a forum for freedom of speech. The anonymity of the Internet allows dissidents to speak up against unpopular governments. However, the anonymity afforded by the Internet is not so much by design as it is byproduct of its original designers not seeing how widespread it would eventually become. more

Macro Observations Facing Email Infrastructure

Last month I attended the 36th annual M3AAWG conference in San Francisco, where esteemed members of the online messaging and anti-abuse community come together to make the Internet a safer and more secure environment. The sending community is highly influential especially among Email Service Providers (ESPs) and truly dominated the two-macro conversations that I participated in. These conversations have the industry in somewhat of a transition. more

Internet Governance Survey: What You Told Us

What do people perceive to be the top issues facing the Internet today? How can stakeholders work more effectively together to strengthen the governance mechanisms meant to address these issues? And when it comes to the Internet Society, what should our role be and where should we focus our attention? To help inform our work in Internet governance, we posed these and other questions to our community in February. We had an overwhelming response with over 800 people taking a few minutes of their time to answer our survey. more

Encryption, Our Last Line of Defense

Encryption is fundamental to our daily life. Practically everything we do online makes use of encryption is some form. Access to our financial transactions, health records, government services, and exchanged private messages are all protected by strong encryption. Encryption is the process of changing the information in such a way as to make it unreadable by anyone except for those possessing special knowledge (usually referred to as a "key"), which allows them to change the information back to its original, readable form. more

The ICANN Board by the ICANN Board

A self-appraisal of the ICANN Board has just been posted on the organization's website. In it, Board members rate 89 different measures of their own performance according to a seven-measure rating from "strongly agree" to "strongly disagree". Unfortunately, despite plenty of figures in the documents, there is zero analysis of what this all means, so I have gone through them and prepared one. more

Why ‘Open’ May Become the Keyword of the Digital World in 2022?

From open standards and software to data, 'open' has been a defining word of the internet since its early days. However, most of the digital growth around major platforms has been driven by proprietary software and 'closed' systems. Recently, companies such as Microsoft and Google have been shifting towards open-source software more and more. Over the last few years, additional momentum was created with the USA adopting the open-source approach to cope with lagging behind, mainly, Huawei in the development of 5G networks. more

ICANN New gTLD Auctions - Apparently No Antitrust Concerns?

There has been much discussion in ICANN circles concerning auctions to resolve new gTLD contention sets. This article summarizes the discussion and events to date, and suggests there should be little worry for applicants seeking to resolve their contention sets via private auction, rather than ICANN's "last resort" auction. more

Communicating Emotion and Presence: From a Hole in Space to Cuba’s Public-Access Hotspots

Cuba, one of the least connected nations in the world, recently created 35 public-access, WiFi hotspots around the island. While 35 hotspots is a drop in the bucket, this opening is a start and it has been noted in many articles and blog posts. Most of the coverage of the new hotspots has been lackluster and redundant, but an article last month in Miami Herald stands out because it stresses the human and emotional impact of these access points. more

TMCH Review Recommends Status Quo

On July 25th ICANN announced the publication of the Draft Report of the Independent Review of the Trademark Clearinghouse (TMCH). This study was coordinated for ICANN by the Analysis Group, in conjunction with researchers from the Center for Internet and Society at Stanford as well the University of Pennsylvania's Wharton School... while public comments on the draft report will be accepted through September 3rd, this Report was triggered by GAC concerns expressed before the Applicant Guidebook for the new gTLD program was even completed, and is not the work product of a GNSO-created working group and therefore will not directly result in the establishment of any new ICANN policy. more

From Crisis to Resilience - the Path to Sustainable Communications Infrastructure in the Caribbean

The Caribbean suffered six major storms in 2017, including the record-breaking Category 5 hurricanes Irma and Maria. In the unprecedented destruction, the islands of Dominica and Barbuda lost all communication and telecommunications service, and eight other Caribbean countries were severely disrupted. Each hurricane season wreaks greater devastation than the last, yet decreased telecommunications competition, inadequate regulation, and high national debt burdens in the region yield ever-diminishing infrastructural investment. more

Now We’re Talking About Some Serious Money

ICANN has now published the results of the auction for .SHOP, an eye-popping $41,501,000. This pushes the ICANN's auction pot over $100 million. That's a lot of money. There are eighteen more name contention sets that are on hold for various reasons, of which a few such as .WEB look likely to generate even more money once the hold issues are resolved. more

Telecom Heroics in Somalia

Internet service in and around Mogadishu, Somalia suffered a crippling blow recently as the East African Submarine System (EASSy) cable, which provides service to the area, was cut by the anchor of a passing ship. The government of Somalia estimated that the impact of the submarine cable cut was US$10 million per day and detained the MSC Alice, the cargo vessel that reportedly caused the damage. more

A Record Year for Domain Name Disputes?

With just a little more than three months left in 2016, the number of domain name disputes filed at the World Intellectual Property Organization (WIPO) appears to be headed for a record year. According to public data published on the WIPO website, the current number of domain name disputes filed this year (as of this writing, September 27, 2016) is 2,228 - which would indicate that the total might reach 3,011 cases by December 31. more

Three Reasons Why CISOs Need to Know How Their Company Is Managing Their Domains

Companies today manage hundreds or even thousands of domain names that support their organization, their visitors from different countries, and their brands and trademarks. They register misspelling of their names as a defensive strategy to protect their brand from online fraud, or from losing traffic to simple user typos. more

Essential Cyber Security Steps for Your Business

Layered security is a concept that's important for anyone who wants to create a strong, successful defense strategy to understand. This is a strategy that relies on the use of multiple lines of defense in an attempt to repel any potential attacks. For this reason, it's based on the principle that says "no single form of protection is enough to stop a determined cybercriminal. more

Topics

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

DNS Security

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days