Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Healthy Domains Revisited: The Pharmaceutical Industry

Users scored an exciting victory over copyright-based censorship last month, when the Domain Name Association (DNA) and the Public Interest Registry (PIR), in response to criticism from EFF, both abruptly withdrew their proposals for a new compulsory arbitration system to confiscate domain names of websites accused of copyright infringement. But copyright enforcement was only one limb of the the DNA's set of Registry/Registrar Healthy Practices. more

What Smaller Institutions Can Learn from DDoS Attacks on Big Banks

Since last fall, several waves of distributed denial of service (DDoS) attacks have targeted major players in the U.S. banking industry. JPMorgan Chase, Wells Fargo and PNC were among the first to sustain intermittent damage. Eventually, the top 50 institutions found themselves in the crosshairs... In the months to come, security experts would praise the banks' collective response, from heightened DDoS protection to candid customer communications.. these larger institutions have learned some painful lessons that smaller firms might heed as they seek to minimize risks. more

Three Reasons Why Apple Didn’t Have to Unlock a Phone

The US government is demanding Apple unlock iPhones in about a dozen cases beside the San Bernardino one. In a strikingly similar case, Judge James Orenstein in Brooklyn rejected the government's request for three separate reasons. In the decision the judge refers several times to the San Bernardino case, and it is clear he expects this decision to be an important precedent for that one. more

Protecting Privacy Differently

My thesis is simple: the way we protect privacy today is broken and cannot be fixed without a radical change in direction. My full argument is long; I submitted it to the NTIA's request for comments on privacy. Here's a short summary. For almost 50 years, privacy protection has been based on the Fair Information Practice Principles (FIPPs). There are several provisions... more

The Threat from Within - US v. Fowler, SDFL 2010

The security vendor-phobe at the head of the conference bangs on the podium with his shoe declaring that "The greatest threat comes from within! (buy our product for your network's salvation)." Fear as a marketing strategy can never be underestimated. Particular when the fear is of the misunderstood. Media helps stoke the flames of fear-marketing with stories of fired or disgruntled IT staff who reportedly effectuate their revenge on former employers by bricking systems. more

New gTLDs and the Power of “Because”

Despite numerous false starts over the last decade it appears that 2011 will be the year ICANN finally implements a new generic Top-Level Domain (gTLD) process that will lead to the responsible expansion of the domain name space. One of the important remaining steps in this process will be the upcoming meeting between the ICANN Board and the Government Advisory Committee (GAC) intended to resolve a number of outstanding differences. more

Work in Progress: Preparing the Next Round of New gTLDs

There are now more than a thousand new Internet suffixes alongside "the originals" (not talking vampires here, but rather .COM et al). These additional web address endings are called "new gTLDs". Since Internet technical coordinator ICANN's 2012 call for applications for the creation of new gTLDs, and their roll-out starting in 2014 when suffixes such as .BARCLAYS (brand TLD), .NYC (geo TLD) and .SKI (generic TLD) became active, the question of another round of applications has been asked repeatedly. more

The IANA Transition’s Terrible, Horrible, No Good, Very Bad Day

Thursday, September 8, 2016 was a terrible, horrible, no good, very bad day for the prospects of the IANA functions transition being completed by October 1, 2016. Indeed, that same date - but in 2017 - may be the earliest that the handoff from NTIA to ICANN can be completed, given what last Thursday. The day began with the announcement that Sen. Ted Cruz would be making his first Senate floor remarks since exiting the Republican Presidential race, and that the talk's focus would be a continuation and escalation of his long-standing opposition to "Obama's Internet giveaway". Shortly after 11 am, Sen. Cruz began speaking from his Senate desk... more

Reshaping Cyberspace: Beyond the Emerging Online Mercenaries and the Aftermath of SolarWinds

Ahmed Mansoor is an internationally recognized human rights defender based in the Middle East and recipient of the Martin Ennals Award (sometimes referred to as a "Nobel Prize for human rights"), On August 10 and 11, 2016, Mansoor received an SMS text messages on his iPhone promising "new secrets" about detainees tortured if he clicked on an included link. Instead of clicking, Mansoor sent the messages to the Canadian Citizen Lab researchers. more

Human Rights and Standards Development Organizations

Do human rights come into the picture when technology and policy work are involved? If so, where? This is a question that has come up multiple times during the last dozen years, and occasionally even before, in Internet Governance discussions. These discussions have included debates on whether human rights were specifically applicable to protocol design or to the organizations developing protocol standards. more

The Perfect, the Good, and the FCC

It has been a busy week in U.S. communications policy, with an FCC meeting adopting important spectrum policy reforms, an FCC complaint about Comcast's approval policies for cable modems, and a dispute between Comcast and Level 3 over fees for Internet backbone traffic. And late last night, it got even more interesting. more

The Over-Optimization Meltdown

In simple terms, Meltdown and Spectre are simple vulnerabilities to understand. Imagine a gang of thieves waiting for a stage coach carrying a month's worth of payroll. There are two roads the coach could take, and a fork, or a branch, where the driver decides which one to take. The driver could take either one. What is the solution? Station robbers along both sides of the branch, and wait to see which one the driver chooses. more

Bring a Responsible Closure to the New gTLD Process - The Home Stretch

Over the course of the last year, the ICANN Board and Governmental Advisory Committee (GAC) have constructively worked through a long list of their differences contained in the GAC scorecard. As we near the finish line with Monday's scheduled ICANN Board meeting to approve the Applicant Guidebook, there remains a small handful of issues that will hopefully be resolved in a similar responsible manner during Sunday's ICANN Board/GAC consultation. more

The Costs of a Dysfunctional Relationship - Part 1

"The current Board-GAC relationship is dysfunctional and has been so for several years." Never has this line from the ATRT Report seemed so apt as now, when the ICANN board and the GAC are preparing to meet in Brussels. Part 1 of this blog will describe their impasse over the introduction of new generic Top-Level Domains (gTLDs). Part 2 will analyze that impasse and offer recommendations to begin resolving it. more

Who Owns Your Connected Device?

It's been clear for years that IoT companies gather a large amount of data from customers. Everything from a smart thermometer to your new car gathers and reports data back to the cloud. California has tried to tackle customer data privacy through the California Consumer Privacy Act that went into effect on January 1. Web companies must provide California consumers the ability to opt-out from having their personal information sold to others. more

Topics

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

DNS Security

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days