Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Fixing Holes

According to press reports, DHS is going to require federal computer contractors to scan for holes and start patching them within 72 hours. Is this feasible? It's certainly a useful goal. It's also extremely likely that it will take some important sites or applications off the air on occasion - patches are sometimes buggy (this is just the latest instance I've noticed), or they break a (typically non-guaranteeed or even accidental) feature that some critical software depends on. more

Trademark Owner Loses Two Domain Name Disputes - On Same Domain Name

I've said many times that winning a domain name dispute under the Uniform Rapid Suspension System (URS) is much more challenging than under the Uniform Domain Name Dispute Resolution Policy (UDRP). But, that doesn't mean trademark owners should take the UDRP for granted. One complainant learned that lesson an especially hard way -- first by losing a URS determination and then by losing a UDRP decision on the same domain name. more

Domain Name Registries and Registrars: The New Digital Trust and Safety Wardens in Bluesky

Just recently, Bluesky -- the decentralized social network running on an open protocol called AT Protocol -- announced that as a mechanism for supporting its business financially, it will directly sell domain names as handles for its users. The sales will be processed through an Internet Corporation for Assigned Names and Numbers (ICANN) accredited registrar, called Namecheap. Currently, the handles on social media platforms are internal handles and not independent domain names. more

Domain Security: An Underused Cybersecurity Strategy and First Line of Defense in Your Zero Trust Model

Domain security is a critical component to help mitigate cyberattacks in the early stages - your first line of defense in your organization's Zero Trust model. According to the Cybersecurity and Infrastructure Security Agency (CISA), most cyberattacks - including ransomware and business email compromise (BEC) - begin with phishing. Although losses due to ransomware now exceed billions annually, most ransomware protection and response measures don't adequately address phishing risks in the early stages of an attack because they don't include domain security measures to protect against the most common phishing attacks. more

Rebalancing Telco Infrastructure Investments

One of the reasons telecommunications has been so successful for more than 160 years is that it adopted a strategy that resulted in a seamless network all around the world. You can pick up a phone anywhere in the world and, with little or no instruction, make a call to anybody else in the world without worrying what phones and technology they are using on the other end of the line... But during that process the nature of the network operators changed. more

Domain Abuse: Are We Speaking the Same Language?

For those of us in the domain name industry, it's clear that security threats and the way we track, report, and mitigate them has been a topic of increased discussion and focus in recent months. As we prepare to come together as a community again at the next ICANN public meeting in Marrakech, many of us will look to continue these conversations, as there is no doubt it is a topic of importance, relevance and urgency for our community at this time. more

A New Definition of Broadband?

FCC Chairman Jessica Rosenworcel has circulated a draft Notice of Inquiry inside the FCC to kick off the required annual report to Congress on the state of U.S. broadband. As part of preparing that report, she is recommending that the FCC adopt a new definition of broadband of 100/20 Mbps and establish gigabit broadband as a longer-term goal. I have a lot of different reactions to the idea. more

A Mexican Standoff in Wonderland

Wikipedia defines a Mexican standoff as "a confrontation in which no strategy exists that allows any party to achieve victory. As a result, all participants need to maintain the strategic tension, which remains unresolved until some outside event makes it possible to resolve it." This would be an apt way to describe what may be possibly occurring presently between the Internet Corporation for Assigned Names and Numbers (ICANN) and its largest ratepayer, VeriSign. more

Privacy in the Age of COVID-19

The Washington Post reports that a recent poll conducted shows that 3 out of 5 Americans are unable or unwilling to use an infection-alerting app developed by Google and Apple. About 1 in 6 adults can't use the app because they don't own a smartphone -- with the lowest ownership levels for those 65 and older. People with smartphones evenly split between those willing versus unwilling to use such an app. more

With the New US CTO, Why Not a New OCA: Office of Connectivity Advocacy

We need a positive strategy for assuring connectivity. Instead of trying to fix telecom we should be working to take advantage of what we have and build vital, even if mundane applications like telemedicine and broaden our access to information while empowering communities. By realizing the value in our existing infrastructure and encouraging the creativity we can provide immediate benefits to our economy and our safety. We need a "Connectivity Strategy" with a champion... more

Lessons from Sandy: Building Networks and Cyber-Infrastructure to Survive Climate Change

Hurricane Sandy has been a badly needed wake up call for the Internet community as to the threat of climate change. Although most people have forgotten, Sandy is the second hurricane to hit New York in as many years with Irene last August and a third tropical depression headed to New York at the time of this writing. Two, supposedly once in a hundred year storms, within such a short time frame should even make the most die-hard denialist that something's afoot. more

OneWeb Is Bankrupt – Who Will Buy Their Assets?

OneWeb has filed for Chapter 11 bankruptcy. OneWeb CEO Adrian Steckel stated that they were "close to obtaining financing" but failed as a "consequence of the economic impact of the COVID-19 crisis." That is plausible, but they were also far behind SpaceX Starlink in launch cost and capacity. (SpaceX, remains open as an essential industry working on defense contracts, but two employees have tested positive for COVID-19) and financial analyst Tim Farrar said SpaceX faced a "near-term cash problem" even before the pandemic). more

Independent Study Shows Very Low Number of Geographical Indications Disputes Within European Domain Names

The EU is reforming its legal framework concerning geographical indications (GI) protection and has put forward provisions expanding GI protection to domain names in two recent legislative proposals concerning agricultural products and craft/industrial products. In order to support greater GI protection on the internet, both proposals mandate the European Union Intellectual Property Office (EUIPO) to establish a "domain name information and alert system." more

Silencing the Cold War Hype: Understanding the Road to .ECO

With ICANN's announcement that the application window for new TLDs will be opening in January 2012 there has been an influx of media coverage directed at our bid for .ECO, as well as the bids of many other organizations the world over. To date, many articles related to our bid have drawn immediate reference to the involvement of Mikhail Gorbachev and Al Gore. more

Brand Protection Beyond the “Whack-a-Mole” Approach

I recently shared at a conference how a seasoned brand and fraud expert from one of the world's largest global financial institutions lamented a major attack where multiple fraudulent websites would pop up every single day. All attacks were launched from the same registrar and web hosting company, and no matter how much they reached out to these providers, they received the same reply: "we will pass on your request to the registrant or site owner," and then nothing happened. more

Topics

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

DNS Security

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days