Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

BP and Incident Response: How Well Do Oil and Security Mix?

BP and the Oil Industry are taking a lot of heat these days - much of it rightly so. Moving beyond the drama and evaluating the overall response of BP and others reinforces much of what is taught in incident response training and preparation... by showing the outcomes when one does not respond well. This is probably the most important incident that the responders involved will deal with in their professional lives. For those of us working to protect Internet Infrastructure and resources there are useful lessons as we consider what is happening in the Gulf of Mexico and their response effort. more

Conditions for Launching your .Brand

The post addresses the factors affecting any decision to rebrand under a new Top-Level Domain (TLD). Depending on the TLDs owned by the competing companies, rebranding can be critical, merely advantageous, or a matter of wait-and-see. (This post does not address signal location/geography, strategies for expanding a brand, or the merits of defensive and offensive domain name registrations under relevant new gTLDs.) First, a simple definition... more

Creative Vertigo: The Spin of the ICANN Branding Revolution

The word gTLD has been added to the hardcore lexicon of global branding. Why is this new spin causing vertigo to some? Before you say anything else like 'what'? Just hold on. It makes no difference whether you already are an expert on gTLD or not. The fact is it's in your face and we all have to deal with it for a long time, so deal with it. On the internet today, from around the world, there are over 10,000 articles on ICANN's gTLD... more

The IPv4 Market Runs on All Cylinders in 2018

2018 was a record-breaking year for the IPv4 market. The total volume of addresses traded, overall number of transactions in the ARIN region, and prices reached their highest levels to date. Since 2014, the number of transactions has grown considerably, mostly attributable to a dramatic increase in small block trades of fewer than 4,000 addresses. The volume of addresses sold during the same period, however, tells a different story. more

Microsoft is Abandoning SHA-1 Hashes for Updates - But Why?

Microsoft is shipping a patch to eliminate SHA-1 hashes from its update process. There's nothing wrong with eliminating SHA-1 - but their reasoning may be very interesting. SHA-1 is a "cryptographic hash function". That is, it takes an input file of any size and outputs 20 bytes. An essential property of cryptographic hash functions is that in practice (though obviously not in theory), no two files should have the same hash value unless the files are identical. more

Buying Open Source… It’s a Different Ecosystem

A lot of organizations are interested in open source software, but fail to give it a fair chance compared to proprietary solutions. One reason for this is that the typical invitation to tender process puts open source at a disadvantage. Open source, as it happens, is made in a different ecosystem. more

Google’s Acquisition of Nest and Smart Homes

Google's $3.2 billion acquisition of high-tech thermostat and smoke-detector maker Nest Labs will allow the company to further infiltrate people's lives, not just via their smartphones but now also via a range of home appliances. It is a logical development for the digital media giant and based on their record of innovation we can expect a range of interesting products and services, also known as machine-to-machine (M2M) communication and the Internet of Things (IoT), to enter this market. more

How AT&T and Verizon Further Consolidated the Wireless Marketplace While Most Weren’t Looking

Before anyone claims victory for the consumer in AT&T's abandonment of its "swinging for the fence" gambit to buy T-Mobile's market share and spectrum, consider what did not make many headlines this week. Both AT&T and Verizon substantially shored up their spectrum stocks with major deals with Qualcomm and several cable companies respectively. Solid hits for both carriers: not homeruns, but very strategic singles and doubles. more

Reviling Universal Service Subsidies and Then Showcasing the Results

Today, the Supreme Court will consider a challenge to the universal service subsidy program established soon after the introduction of telephone service by the AT&T Bell System and later officially adopted by the FCC as mandated by a 1996 law.1, 2 Universal service funding supports access to telephone and broadband service by subscribers in rural locales that commercial ventures will not serve absent a subsidy. more

TMCH Review Recommends Status Quo

On July 25th ICANN announced the publication of the Draft Report of the Independent Review of the Trademark Clearinghouse (TMCH). This study was coordinated for ICANN by the Analysis Group, in conjunction with researchers from the Center for Internet and Society at Stanford as well the University of Pennsylvania's Wharton School... while public comments on the draft report will be accepted through September 3rd, this Report was triggered by GAC concerns expressed before the Applicant Guidebook for the new gTLD program was even completed, and is not the work product of a GNSO-created working group and therefore will not directly result in the establishment of any new ICANN policy. more

A Record Year for Domain Name Disputes?

With just a little more than three months left in 2016, the number of domain name disputes filed at the World Intellectual Property Organization (WIPO) appears to be headed for a record year. According to public data published on the WIPO website, the current number of domain name disputes filed this year (as of this writing, September 27, 2016) is 2,228 - which would indicate that the total might reach 3,011 cases by December 31. more

Why ‘Open’ May Become the Keyword of the Digital World in 2022?

From open standards and software to data, 'open' has been a defining word of the internet since its early days. However, most of the digital growth around major platforms has been driven by proprietary software and 'closed' systems. Recently, companies such as Microsoft and Google have been shifting towards open-source software more and more. Over the last few years, additional momentum was created with the USA adopting the open-source approach to cope with lagging behind, mainly, Huawei in the development of 5G networks. more

Patient Care Suffers When Data Security is a Budgetary Concern

According to a recent Homeland Security News Wire article, nearly 8 million patient medical records were compromised over the course of the previous two years due to data security breaches. As more hospitals and patient care providers move to store patient data electronically -- primarily as a cost savings effort -- the risk and exposure of our private medical information increases while our individual control over this information diminishes. more

Pricing & Promotions of TLDs - Is Your Billing System Holding You Back?

As the leading consulting firm to the Domain Name industry, we work with many of the existing gTLDs, ccTLDs and new gTLDs. During our engagements we do a lot of listening (as well as work) and this gives us a unique perspective on the key challenges the industry is facing. Recently, we are hearing feedback from many leading registries and registrars about their need for more dynamic pricing and promotions and their concern that there may not be enough flexibility in their billing systems to speedily handle their promotion plans. more

Reducing the Risks of BYOD with DNS-Based Security Intelligence; Part 1: Understanding the Risks

Ah, BYOD. How I love thee. BYOD, or "Bring Your Own Device", gives me choices. I can use a device at work I actually like and am most effective with. (How did I ever get by without my iPad?) But BYOD comes with challenges. Personal devices can be infected with malware. Once they're connected to an enterprise's network, they can be controlled by a bot master to hijack enterprise resources and wreak havoc as part of a botnet. more

Topics

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

DNS Security

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days