Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

FISMA Standards Could Have a Major Impact on the Private Sector

The public is taking an increasing interest in ensuring that IT assets of federal agencies are protected from cybersecurity attacks. FISMA is addressing this concern, in part, by initiating a standard setting process for continuous monitoring. The actions taken by NIST for the federal sector could have a very significant impact on the private sector because pending legislation would provide the federal government with the authority to mandate cybesecurity measures on the private sector. more

Searching for Truth in DKIM: Part 5 of 5

Throughout this series of articles we've been talking about DKIM, and what a valid DKIM signature actually means. .. What this means for senders (of any type) is that with DKIM, you’re protected. On the internet, your domain name is a statement of your brand identity – so by signing messages with DKIM, you can finally, irrevocably tie those messages to your brand. more

How Can Greater Security, Safety and Trust in the Internet Be Created?

In the coming days, the Internet Governance Forum Dynamic Coalition on Internet Standards, Security and Safety will be announced on the IGF website. The following is an invitation to participate, share ideas and best practices, the willingness to take on a new approach towards mass deployment of internet standards and ICT best practices. Feel free to reach out to us and start working towards a kick-off meeting at the global, virtual Internet Governance Forum in November. more

Enough About Apple and Encryption: Let’s Talk System Security

This week, the RightsCon Silicon Valley 2016 conference is taking place in San Francisco. Since the use of encryption in general and the Apple/FBI case in particular are likely to be debated, I want to share a perspective on system security. My phone as a system The Apple/FBI case resolves around a phone. Think of your own phone now. When I look at my own phone I have rather sensitive information on it. more

ICANN Voting to Pull the Weeds is Good - Pulling Them is Even Better

At the ICANN Public Forum in Singapore yesterday, I likened the ICANN to a community garden: fertile, colorful and above all, worthwhile, but not without a few troublesome weeds. Today's Board vote to adopt the recommendations of the Accountability and Transparency Review Team (ATRT) is a vote to pull those weeds. As good as voting for this weed-pulling exercise is, completing it will be even better. more

ACCC Loses Court Case: Google Not Responsible for Content Paid Adds

In a court case running since 2007 Australia's High Court judged Google not responsible for the content of paid ads it presented after an end user's search request. In the example Reuters gives a car sales company presented itself under the name of a car brand, thus misleading the end user. The Australian Competition and Consumer Commission (ACCC) deemed this misleading advertising by Google and stared a court case. The High Court judged differently. more

Apple Satellites?

Word has leaked out that Apple is working on a satellite project. The company is at the beginning of the research project, so there is no way to know exactly what they have in mind. For example, is the company considering launching satellites, or would they lease capacity from one of the other planned satellite networks? The fact that Apple is working on the concept is a good segue to discuss the many ways that satellite connectivity could be useful to Apple or other companies. more

Carpet Bombing in Cyber Space - Say Again?

I was pointed to an article in the Armed Forces Journal where Col Charles W. Williamson III argues that the US Air Force needs to develop a BOTnet army as part of the US military capability for retaliatory strikes. The article brings up some interesting issues, the one that I believe carries the most weight is the argument that we (well, people living on the Internet) are seeing an arms race. It is true that more and more nations are looking into or developing various forms of offensive weapons systems for the use on the Internet... more

M-Government Requires Mobile ID

More and more governments are now looking at electronic ways to deliver services to their citizens. With the enormous growth in mobile penetration this infrastructure is now becoming a viable alternative in the delivery of services. But personal authentication is required to make this happen. This is recognised throughout the industry for a range of services and the GSMA has launched a project 'Mobile Contact' aimed at developing a standardised mobile ID. more

Making the Most of the Draw: The Applicant Auction Conference

Yes, it is a bit odd that applicants for top-level domains need to attend the Prioritization Draw in person on December 17. Jetting to LAX to observe a raffle may seem like a waste of time and money. But here is how to make the most of it. Attend the Applicant Auction Conference at the Marriott Santa Monica on December 18. more

The “Pact for the Future”: A Bold Vision for Global Cooperation with Lingering Doubts on SDGs Progress

Global leaders gathered in New York at the Summit of the Future and adopted the "Pact for the Future" on Sunday 22nd September. This is a historic milestone as the Pact is the first international agreement aimed at securing a better digital future for all, grounded in human rights. The recent adoption of the "Pact for the Future" at the United Nations General Assembly marks a significant step toward revitalizing multilateral cooperation in an increasingly fragmented world. more

Broadband in Emerging Markets

Today, over half the world's population now has access to a mobile phone, with 5.37 billion mobile subscriptions and over two billion internet users worldwide by the end of 2010. However, these are more than just bald statistics -- today, modern ICTs are genuinely changing people's lives for the better. more

Taking Permission

Permission is always a hot topic in email marketing. Permission is key! the experts tell us. Get permission to send email! the ISPs tell us. Marketers have responded by setting up processes to "get" permission from recipients before adding them to mailing lists. They point to their privacy polices and signup forms and say "Look! the recipient gave us permission." In many cases, though, the permission isn't given to the sender, permission is taken from the recipient. more

Application Delivery Controllers as Safety Net for Ad Servers

Ad serving platforms drive a lot of web site revenue. These software platforms grant a site manager control over local or remote ads appearing on his web site. Over the years these platforms grew in functionality and today they offer diverse functions... Performance issues on such a platform can take down the ads on dozens of different sites, causing massive loss of revenues to the site and the platform owners. more

A Proposal for Creation of “Community Veto” Process on ICANN Board’s Key Decisions

Below is the text of a proposal made today to ICANN's Cross Community Working Group on Accountability (CCWG-ACCT) to create a community veto process over certain key decisions of ICANN's board of directors. This community veto process could be created by amending ICANN's existing corporate bylaws, which should also be amended to provide the means to recall nonperforming board members in certain situations. more

Topics

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days