Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Defending Against the Hackers of 1995

Two factor authentication that uses an uncopyable physical device (such as a cellphone or a security token) as a second factor mitigates most of these threats very effectively. Weaker two factor authentication using digital certificates is a little easier to misuse (as the user can share the certificate with others, or have it copied without them noticing) but still a lot better than a password. Security problems solved, then? more

Into the Gray Zone: Considering Active Defense

Most engineers focus on purely technical mechanisms for defending against various kinds of cyber attacks, including "the old magic bullet," the firewall. The game of cannons and walls is over, however, and the cannons have won; those who depend on walls are in for a shocking future. What is the proper response, then? What defenses are there The reality is that just like in physical warfare, the defenses will take some time to develop and articulate. more

Free Broadband: The Shape of Things to Come

The UK's broadband market is one of the most competitive in Europe. The DSL network effectively covers the entire country, while the network of the dominant cable provider Virgin Media covers more than half of all households (about 12.6 million homes). Beginning in 2007, Virgin Media expanded the availability of its services not by increasing the footprint of its cable network but by utilising wholesale LLU services... more

Cruz’s Crusade Against IANA Transition Continues with Senate Hearing

Senator Cruz's against the IANA transition will continue next week with a senate hearing next week. The hearing is entitled: Protecting Internet Freedom: Implications of Ending U.S. Oversight of the Internet. While the hearing is being chaired by Cruz, no indication of who else will be speaking has been made public so far. In a press release from Cruz's offices earlier this evening, the Senator continued his almost hysterical and misleading narrative. more

How to Design a Decentralized Social Media Protocol – Be Ruthless About Technical Requirements and Eager to Build Coalition

Project Liberty's Institute sat down with Dave Clark, an early contributor to the TCP/IP protocols that built and run the Internet, and one of the expert advisors on DSNP, the Decentralized Social Networking Protocol. Dave Clark is Senior Research Scientist at MIT's Computer Science and Artificial Intelligence Laboratory (CSAIL) and Fellow of the National Academy of Engineering and the American Academy of Arts and Sciences. more

Brand Control: The Next Stage for Digital

Social and Digital Marketing are two of the fastest growing, and arguably the most important, pieces of branding today. According to eMarketer, 2017 digital marketing expenditures will account for 38.4% of total ad spending and are projected to be almost 45% by 2020. This is double what they were just a few years ago and growth doesn't seem to be slowing down. more

The Mobile App Trap

The Apple App Store was seven years old as of Friday, 10 July, marking a key -- and possibly critical -- evolution in how we use the Internet. First, the numbers, which are truly astounding -- there are now more than 1.4 million apps available, which have been downloaded more than 100 billion times. And that's just Apple. Add in Android and the other platforms, and we start talking about a new app economy, generating billions in revenues for developers from around the world. more

Economics and Common Sense Deprecates the Common Argument for Lower Spectrum Prices

Outside of China, very few governments would expect a saving in spectrum costs would mostly go to investment. Corporations have other priorities, including advertising and executive salaries. Stockholders come above everything at most companies. Rarely would even 1/3rd of the saving go to capital spending. The U.S. under Trump had a massive tax cut, worth literally billions to Verizon and AT&T. Verizon actually cut investment. AT&T's increase in capex was far lower than the tax saving. more

Why We Don’t “Stick to Our Knitting”: auDA’s Role in the Internet Governance Landscape

Last Friday, following three weeks of dazzling diplomacy, the International Telecommunication Union's (ITU) 2014 Plenipotentiary Conference came to a conclusion in Busan, South Korea. For those unfamiliar with the event, the "Plenipot" is the ITU's most significant gathering... At the Plenipot, ITU members elect new office-bearers, set general policies and determine the Union's strategic plans and activities for the next four years. It is this last part that is of most interest to stakeholders in the Internet community... more

Virtual Assistants Market on the Rise, Poised to Rule in 2017

In Spike Jonze's 2013 film "Her", the main character Theodore Twombly (played by Joaquin Phoenix) falls in love with a Siri-like virtual assistant. It is an intelligent computer operating system, a variance of AI envisioned by the high technology developers of today. We are still far away from creating AI capable of thinking and learning for themselves, not to mention living in symbiosis with them. However, Intelligent Virtual Assistants can be perceived as a step towards the fulfillment of the idea. more

Certifying to Merit and Proper Purpose in Alleging and Defending Cybersquatting Claims

Parties to a UDRP proceeding must include a certification similar in U.S. practice to Rule 11 of the Federal Rules of Civil Procedure (and undoubtedly a feature in procedural codes in other judicial jurisdictions) "that the information contained in this [Complaint or Response] is to the best of [Complainant's or Respondent's] knowledge complete and accurate, that this [Complaint or Response] is not being presented for any improper purpose, such as to harass... more

Washington’s 5G Mania Endpoint – Global CyberBalkanisation

Over the past two years, governments and foreign intelligence agencies around the world have tried to understand the inexplicable, chaotic, irrational, indeed maniacal 5G policies of the Trump Administration. Revelations by former Trump administration officials and most recently Trump's niece confirm that there is no rational basis for Trumpian positions and policies and that the best response is to recognize that Washington is no longer capable of playing a meaningful role... more

Consistency, Urgency, and Transparency Needed for Registrant Data Requests

As we reported in our Post-GDPR Compliance Rate retrospective in January 2020, registrar compliance rates in response to verified requests for redacted registrant information using the Appdetex WHOIS Requestor System was 25 percent. Our most recent report shows the compliance rate has increased to 27 percent, based upon a total of 243 requests for redacted WHOIS information sent to 68 registrars over the period starting January 1, 2020, through February 24, 2020. more

The Importance of the Emerging Data Trusts

I recently followed a webinar session organized by the University of Queensland on the factory of the future. Smart or not, the future will still need factories to make the stuff we humans use every day. One of the discussed questions included: "how will existing production models cope with the staggering and ongoing rate of digital disruption and advanced capabilities?" more

Save the Date: .US Public Stakeholder Town Hall (April 22, 1-3 ET / 10-12 PT)

.US is the top-level domain for the United States of America. As stakeholders in the .US ccTLD, we all share a vested interest in making sure that .US continues to be a vibrant namespace that reflects the diversity, creativity and success of our people. As the Internet continues to grow and evolve, it's important that the .US domain does too. To meet these needs, Neustar and the usTLD Stakeholder Council plan to hold a virtual .US Public Stakeholder Town Hall Meeting. more

Topics

Threat Intelligence

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days