Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Blasphemy: The U.S. Problem Is Huawei’s Security Is Too Good

Everyone knows the $100B/year U.S. security apparatus taps almost the entire Internet. Friendly governments help from Australia to Canada to France. Companies like AT&T, Ericsson, Verizon, and Nokia obviously cooperate. The NSA assumes that China is attempting to do the same and that Huawei, as a Chinese company, will provide assistance. The evidence suggests otherwise. Huawei is the primary opponent of U.S. security. more

The Boundary Between Sec. 230 Immunity and Liability: Jones v. Dirty World Entertainment Recordings

Out in the wilderness of cyberspace is a boundary, marking the limits of Sec. 230 immunity. On the one side roams interactive services hosting third party content immune from liability for that third party content. On the other sides is the frontier, where interactive content hosts and creators meet, merge, and become one. Here host and author blend, collaborating to give rise to new creations. more

Persistent Threat Detection on a Budget

If there's one simple - high impact - thing you could do to quickly check whether your network has been taken over by a criminal entity, or uncover whether some nefarious character is rummaging through your organizations most sensitive intellectual property out of business hours, what would it be? In a nutshell, I'd look to my DNS logs. It's staggering to me how few security teams have gotten wise to regularly interrogating the logs from their recursive DNS servers. more

Freedom on the Internet: Where Does Your Country Stand?

Out of the 3 billion users on the Internet, how many can trust that their online communications will not be monitored or censored? How many feel safe that they can express their opinions online and will not be arrested for their ideas? How many feel confident in communicating anonymously online? For us at the Internet Society this is a key element of an Internet of opportunity: Internet access is only meaningful if people can trust that their fundamental rights will be respected and protected online as well as offline. more

Your Future is Scripted! China, AI and the Race for Digital Authoritarianism

The race for digital authoritarianism between China and the US is now exceedingly stark. It is a race with enormous implications for the management of humankind, (yes I said it) and the respected doctrines of our human rights and freedoms. Everything we care about today as freedom-loving citizens will be transformed by AI, from access to healthcare to economic status and, more importantly, your ability to serve. more

One More Trump 5G Minefield

As the saying goes, it's not over until it's over. So, it wasn't surprising that Trump's minions just got one last 5G minefield out the door. On 15 January, his followers at Dept. of Commerce's NTIA published the "National Strategy to Secure 5G Implementation Plan". The 40-page document consists of a fairly standard Washington policy playbook of 18 activities with six annexes that "details how the United States along with like-minded countries will lead global development, deployment, and... more

Content vs Carriage – Who Pays?

There was a common catch cry in the early 1990s that "the Internet must be free!" Some thought this was a policy stance relating to the rejection of imposed control over content. Others took this proposition more literally as "free, like free beer!" It might sound naive today, but there was a widespread view at the time that the Internet was able to cast aside conventional economics and operate the Internet infrastructure without charging end-users at all! more

Creating, Protecting and Defending Brand Equity - Part 2

In the second of three posts about how brand owners can protect their trademarks from misuse, I will focus on two concepts: the role of "use" and registration in protecting your brand, and domain names -- specifically acquisition and protection. Internet domain names have emerged as a major battleground for brand promotion and protection. While it is easier than ever to register and promote your name on the internet, it is also easier for others to trade on another brand's equity. more

GFC Slows Down Cloud Computing Developments

The ongoing Global Financial Crisis (GFC) has also had a significant impact on some of the developments in our industry -- for example, cloud computing. It looks as though the GFC is the key reason that developments in cloud computing have not happened more quickly. Industry evidence suggests that shifting to the cloud saves 20%-50% off current IT deployments, and, according to its advocates, it can be many times more than that. more

Apple Satellites?

Word has leaked out that Apple is working on a satellite project. The company is at the beginning of the research project, so there is no way to know exactly what they have in mind. For example, is the company considering launching satellites, or would they lease capacity from one of the other planned satellite networks? The fact that Apple is working on the concept is a good segue to discuss the many ways that satellite connectivity could be useful to Apple or other companies. more

In Response to ‘Networking Vendors Are Only Good for the Free Lunch’

I ran into an article over at the Register this week which painted the entire networking industry, from vendors to standards bodies, with a rather broad brush. While there are true bits and pieces in the piece, some balance seems to be in order. The article recaps a presentation by Peyton Koran at Electronic Arts (I suspect the Register spiced things up a little for effect); the line of argument seems to run something like this... more

Mix It Up: Key Ingredients of Successful Cloud Management Systems

The cloud cuts both ways; while the ability to spin up compute power on demand has empowered even small businesses to compete on a global scale, this same flexibility has led to a significant amount of "cloud sprawl." According to Tech Radar, 61 percent of companies surveyed said cloud sprawl - both from employees using unauthorized services and not fully utilizing approved resources - is responsible for business-wide inefficiencies. Bottom line? more

Tough Questions for ATRT

Public comments on the Proposed Recommendations published by the Accountability and Transparency Review Team ("ATRT") have now been submitted, and it is worth stepping back to evaluate ATRT's work in the context of ICANN's larger challenges. ATRT was constituted to carry out ICANN's commitments under the AoC. Yet at times ICANN acted as if ATRT were an adversary rather than a partner... more

The Growing Rate of Standalone Broadband Adoption

Parks Associates recently announced its Home Services Dashboard release, a for-pay service that tracks consumer adoption of telecom services like Internet, pay-TV, and cellphones. As part of the announcement, the company released a blog that shows that at the end of the first quarter of 2021 that 41% of US homes are buying standalone broadband - meaning broadband that's not bundled with cable TV or a home telephone. more

New Cyberthreats: Have You Been Exposed at Home?

There are new threats that you may have already been exposed to. Here are some of the new threats and advice on how to protect yourself. During this pandemic, Zoom has emerged as a very popular teleconferencing choice for companies and educational institutions, but a new weakness for Zoom was also discovered. Some online conferences and classes that had not password protected their sessions fell victim to eavesdroppers using the screen sharing feature to "Zoom Bomb" those sessions with graphic images. more

Topics

DNS Security

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days