Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

WIPO Updates GDPR Guidance for UDRP

Three months after implementation of the European Union's (EU) General Data Protection Regulation (GDPR), the World Intellectual Property Organization's (WIPO) Arbitration and Mediation Center has expanded and updated its already helpful web page with important questions and answers about how the GDPR is impacting the Uniform Domain Name Dispute Resolution Policy (UDRP). more

Counting Gigabit Households

I ran across a website called the Gigabit Monitor that is tracking the population worldwide that has access to gigabit broadband. The website is sponsored by VIAVI Solutions, a manufacturer of network test equipment. The website claims that in the US, over 68.5 million people have access to gigabit broadband or 21% of the population. That number gets sketchy when you look at the details. more

Watching the Watchers Watching Your Network

It seems that this last holiday season didn't bring much cheer or goodwill to corporate security teams. With the public disclosure of remotely exploitable vulnerabilities and backdoors in the products of several well-known security vendors, many corporate security teams spent a great deal of time yanking cables, adding new firewall rules, and monitoring their networks with extra vigilance. more

Carriers Are No Longer Operators

The classic view of a wireline or mobile carrier is that it was an "operator", it ran out cables, raised poles, installed switches, constructed central offices and base stations and the like. However, the figures from Nokia Siemens Networks (NSN) show that firm is making 45% of its sales from services, meaning it is constructing and managing networks on behalf of "carriers". NSN is "carrying" a lot of telecoms traffic. This has been accelerated by the global financial crisis... more

Exploiting Video Console Chat for Cybecrime or Terrorism

A couple of days ago there was a lot of interest in how terrorists may have been using chat features of popular video console platforms (e.g. PS4, XBox One) to secretly communicate and plan their attacks. Several journalists on tight deadlines reached out to me for insight in to threat. Here are some technical snippets on the topic that may be useful for future reference. more

5 Broadband Predictions for 2020

The 2010's have been nothing short of transformative in the broadband space. Despite disappointing deployment rates across the U.S., the past decade has been a period of exponential change and innovation. As we look toward the new decade, here are five key predictions based on current trends and developments in the broadband industry. more

The Impact of Satellite Broadband

Recently I've had several people ask me about the expected impact of low-orbit satellite broadband. While significant competition from satellites is probably a number of years away, there are several major initiatives like StarLink (Elon Musk), Project Kuiper (Amazon), and OneWeb that have announced plans to launch swarms of satellites to provide broadband. more

I Didn’t Put My Name on the Census

On many occasions I have written about the dangers of electronic communications in relation to data retention laws, government e-spying and other activities undermining our democracy and our liberty. To date governments still have to come up with evidence that all of this spying on their citizens has prevented any terrorist attacks. Terrorism has been given as the key reason for the government's spying. more

The Life Cycle of Digital Certificates Reduces Again

Recently, there were news articles about a large software provider who experienced a global outage due to an expired digital certificate - and this is not the first time this kind of issue has hit the news. Digital certificate outages, when an organization forgets to replace an expiring certificate for a business-critical domain name, continues to cause business disruption and security risks. more

ICANN Clarifying Questions - How Are They Structured? (Part 1 of 3)

Several weeks ago ICANN issued clarifying questions to approximately 50 of the 1,930 new gTLD applications submitted last spring. Some of our clients were selected for this pilot effort and we've had the opportunity to review seven sets of clarifying questions totaling approximately 30 individual questions. ICANN has indicated that in late November they will begin issuing Clarifying Questions to the balance of applicants. more

Supplementing the Record in UDRP Proceedings; When Acceptable?

The Uniform Domain Name Dispute Resolution Policy (UDRP) limits parties' submissions to complaints and responses; accepting "further statements or documents" is discretionary with the Panel (Rule 12, Procedural Orders), although the Forum (in Supplemental Rule 7) but not WIPO provides for supplementing the record with the proviso that "[a]dditional submissions must not amend the Complaint or Response." For some panelists, Rule 7 contradicts the Policy. more

At the NCPH Intersessional, Compliance Concerns Take Centre Stage

The non-contracted parties of the ICANN community met in Reykjavík last week for their annual intersessional meeting, where at the top of the agenda were calls for more transparency, operational consistency, and procedural fairness in how ICANN ensures contractual compliance. ICANN, as a quasi-private cooperative, derives its legitimacy from its ability to enforce its contracts with domain name registries and registrars... more

The Long-Run Effect of Cuba’s Recent Internet-Augmented Protests

It’s now more than 6 weeks since the Cuban political protests and accompanying Internet service disruption. Will they lead to a long-run change in the Cuban Internet or the Cuban political situation? Let’s start with the Cuban Internet. Many of the Internet changes during the protests have disappeared. Total daily traffic, the ratios of mobile to fixed traffic, and human to automated posts, and the proportion of blocked Signal sessions are about what they were before the protests. more

When a Domain Name Dispute is ‘Plan B’

While having a backup plan is usually a good idea, it's often not an effective way to obtain someone else's domain name - at least not when Plan B consists of a company filing a UDRP complaint with the hope of getting a domain name to which it is not entitled and could not acquire via a negotiated purchase. "Plan B" as a derogatory way of describing an attempted domain name acquisition usually arises in the context of a domain name that is not protected by exclusive (or any) trademark rights, or where the complainant clearly could not prevail in a UDRP proceeding. more

Connecting the Next 46 Percent: Time to Pick the Good From the Bad and the Ugly

On the 5th of November 2019, the release of the first of ITU's Measuring Digital Development series coincided with Freedom House's unveiling of its Freedom on Net 2019 report. This serendipity prompted me to write this blog note after carefully examining both reports. On one hand, ITU's analytical publication, with its new friendly format, emphasizes that Internet use continues to spread, warning however that the digital gender gap is widening. more

Topics

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days