Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

BP and Incident Response: How Well Do Oil and Security Mix?

BP and the Oil Industry are taking a lot of heat these days - much of it rightly so. Moving beyond the drama and evaluating the overall response of BP and others reinforces much of what is taught in incident response training and preparation... by showing the outcomes when one does not respond well. This is probably the most important incident that the responders involved will deal with in their professional lives. For those of us working to protect Internet Infrastructure and resources there are useful lessons as we consider what is happening in the Gulf of Mexico and their response effort. more

AI Has No Time for “Human” Rights

Popular media have recently reported a White House initiative asserting companies' "moral obligation" to limit the risks of AI products. True enough, but the issues are far broader. At the core of the debate around AI -- will it save us or destroy us? -- are questions of values. Can we tell AI how to behave safely for humans, even if in the future it has a "mind of its own"? It is often said that AI algorithms should be "aligned with human values." more

Patient Care Suffers When Data Security is a Budgetary Concern

According to a recent Homeland Security News Wire article, nearly 8 million patient medical records were compromised over the course of the previous two years due to data security breaches. As more hospitals and patient care providers move to store patient data electronically -- primarily as a cost savings effort -- the risk and exposure of our private medical information increases while our individual control over this information diminishes. more

Buying Open Source… It’s a Different Ecosystem

A lot of organizations are interested in open source software, but fail to give it a fair chance compared to proprietary solutions. One reason for this is that the typical invitation to tender process puts open source at a disadvantage. Open source, as it happens, is made in a different ecosystem. more

If Thou Be’st as Poor for a Subject as He’s for a King…

Way back in 1995, Wired reporter Simson Garfinkel gave Jeff Slaton the name "Spam King." Less than a year later, Sanford Wallace earned the title -- and soon had to share it (and his upstream provider) with Walt Rines. Others have come and gone; Sanford and Walt reappear every few years, together or separately, only to be sued away again... it seems as if any spammer noticed by law enforcement is immediately crowned "the Spam King," even when there are multiple such crownings happening at the same time. more

Independence is New gTLD Compatible

Independence must be a fashion of the moment. Cataluña, a place where I've lived, is fighting hard to be independent and, even if I don't believe a second that this will ever happen, it is a common example of a community which fought hard, very early and by all means, to operate a new gTLD to clearly identify its culture (and Nation) on the Internet: the .CAT Top-Level domain. Note that this TLD has nothing to do with the .DOG nor .PET new gTLDs (joke). more

WordPress Now Powers 39.5% of the Web

Last month in the annual "State of the Word" presentation for 2020, Automattic CEO and WordPress co-founder Matt Mullenweg announced that WordPress now powered 39% of websites, as measured by W3Techs. The number has actually grown a bit more since that time to 39.5%.1 Perhaps by next month it will pass 40%. What is more remarkable to me is to see that in December 2020, for the first time, the number of sites using WordPress passed the number of sites that were NOT using any form of content management system (CMS). more

Reducing the Risks of BYOD with DNS-Based Security Intelligence; Part 1: Understanding the Risks

Ah, BYOD. How I love thee. BYOD, or "Bring Your Own Device", gives me choices. I can use a device at work I actually like and am most effective with. (How did I ever get by without my iPad?) But BYOD comes with challenges. Personal devices can be infected with malware. Once they're connected to an enterprise's network, they can be controlled by a bot master to hijack enterprise resources and wreak havoc as part of a botnet. more

Critical Role for R&E Networks+Commercial Clouds in US Government “Big Data” Initiative

It is great to see US and European governments undertake initiatives to promote the development of research into Big Data utilizing commercial clouds. Many cloud providers are offering free resources to support these initiatives. R&E networks will play a critical role in linking researchers to the commercial clouds and developing collaboration platforms and portals. more

Google Cracks Down on Illegal Online Pharmacies

Announced on the Google Blog last week, the search engine giant has filed a federal lawsuit against a group of rogue pharmacies in an effort to stop them from advertising on its search engine and websites. Michael Zwibelman, the company's litigation counsel, notes that the advertisers have deliberately "violated policies and circumvented technological measures" by using Adwords to promote pharmacy and prescription-drug operations without verification from the National Association of Boards of Pharmacy. more

Does the Internet Need “Governance”?

It's remarkable to me that there are now two powerful agencies fighting to "govern" the Internet -- the ITU and the FCC. On any given day, it's hard to tell whether they are on the same side or different sides. The ITU process apparently began in earnest with the World Summit for the Information Society (WSIS) meetings, where the concept of "Internet Governance" became an urgent goal. The FCC process began when incumbent Internet Access Providers (IAPs) argued that "Net Neutrality" was a stalking horse for government control... more

What New gTLDs Mean for Developing Economy Applicants?

Everyone seems excited about new gTLDs being just around the corner. All of the overarching issues will soon be resolved: GAC and the ICANN Board will sit in a room and the wisdom of our leaders, ICANN and National, will produce the grand compromise. The starting flag will be flourished! A thousand flowers will bloom! Hooray! But it is only the developed world that can be excited about this, for it is hard to understand how the developing world could be very excited about an overpriced round of gTLD offerings that is unfairly beyond their means. more

Reverse Domain Hijacking Where Complainant Knew but Did Not Disclose Geographic Significance of Mark

In the case of Oy Vallila Interior Ab v. Linkz Internet Services, a 3-member WIPO Panel denied the Complainant's efforts to have the disputed domain name vallila.com transferred because the Complainant did not prove that the Respondent registered and used the disputed domain name in bad faith. The Complainant is in the business of providing fabrics and interior design services and claimed trademark rights in its registered mark VALLILA in the European Union. more

Technologists vs. Marketers: Talking Incompatible Talk Leads to Walking in the Wrong Direction

As if conversations between technologists and marketers weren't already difficult enough, it appears that the Direct Marketing Association's (DMA) Email Experience Council wants to redefine long-standardized terms such as "header" and "message." more

Is There Any Room for Communities in The New gTLD Program?

With the start of hunting season for new gTLDs, attention needs to be paid to Community in all of its reality and diversity. After family, community is one of the strongest organizational principles in human society and has been since the beginning of history. With the rare exception of the classical hermit, everyone is part of multiple communities. Communities are important and need to be protected by society and by this new gTLD process. more

Topics

Cybersecurity

Sponsored byVerisign

DNS Security

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days