Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Three Layers of China’s International Strategy on Cyberspace

China's newly released International Strategy on Cyberspace is marked by three distinctive layers with different degree of priority: (1) sovereignty (or cybersecurity, or UN Charter), (2) globalization (or digital economy, or WTO rules), and (3) fundamental freedoms (or human rights, or UDHR). The good point of the strategy is that it tries to make the three layers peacefully co-exist in one document. The failure, however, lies in the intentional ranking of relevance/importance of the three layers... more

Internet Governance in 2023

It's been an interesting couple of weeks for me, in mid-October 2023. I presented in a couple of panels at the 18th Internet Governance Forum meeting, held in Kyoto, Japan, and I also listened in to a couple of sessions in their packed agenda. The following week, I followed the presentations at NANOG 89, the meeting of the North American Network Operator's Group, and listened to a presentation by John Curran, the President and CEO of ARIN, where he gave his impressions of the current state of Internet Governance. more

The Sharing Economy and Sec. 230(c) of the Communications Decency Act

The sharing economy is a challenge for local communities. On the good, it creates economic opportunity and reduces the price. On the bad, it circumvents public safety and welfare protection. Such is the clash between Airbnb and local jurisdictions. San Francisco implemented a local ordinance that permits short-term rentals on the condition that the rental property is registered. In order to register the property, the resident must provide proof of liability insurance... more

Leveraging DNS for Subscriber Loyalty

There has been a lot of talk about how the DNS can provide network-based security, and how DNS is in the best position to detect malware traffic before it does any harm. But what does this mean for end users? How does it make their online lives easier and more secure? DNS servers that are aware of sites that host malware, perform phishing activities (harvesting bank details, for instance) and other nefarious misbehaviors, can prevent end users from ever going to those sites. more

CEOs and Encryption: The Questions You Need to Ask Your Experts

Barely a week passes without something in the news that reminds us of the critical role encryption plays in securing our data. It is a technology that protects so much of what we rely on, as individuals protecting our privacy, as companies securing our business assets and transactions, and as governments responsible for critical national infrastructure. ... The request Kathy mentions came after the San Bernardino shootings in California... more

5G First in China’s Key Industrial Investment

Four Chinese ministries issued the policy document in September, called "Guiding Opinions on Expanding Investment in Strategic Emerging Industries and Cultivating Strengthened New Growth Points and Growth Poles." As you can see below, in this document, 5G was the top recommendation. The National Development and Reform Commission, Ministry of Science and Technology, Ministry of Industry and Information Technology, and the Ministry of Finance came together to suggest priorities for the 14th Five-Year Plan. more

Your AI Strategy Canvas: Part 2

The AI Strategy course at UC Berkeley has come to an abrupt end, but formal learnings in AI will continue. I want to thank professors at UC Berkeley, Alberto Todeschini, Ph.D., and Stuart Russell, who developed a comprehensive course to implement AI in business. After three certificates, Alberto has encouraged me to pursue a master's in Artificial Intelligence. My wife and I are contemplating this next step. more

Regulation of Algorithmic Regulation Begins

A Chinese law that went into effect six months ago required online service providers to file details of the algorithms they use with China's centralized regulator, the Cyberspace Administration of China (CAC). In mid-August, CAC released a list of 30 algorithms used by companies such as Alibaba, TenCent and Douyin, the Chinese version of Tiktok, with a brief description of their purpose. more

US Congress Re-Launches Treaty Talks on Internet Economy

Final echoes of the US Senate committee's questions of Facebook this week will only fade in the UN Security Council where, in a few years, Member States will adopt a treaty on regulation of the Internet Economy. By opening wide the door to questions on privacy, revenue, security and purpose, Congress showed its well-placed concern and signaled that others can too. more

A Patchwork Quilt: Abuse Mitigation, the Domain Naming System and Pending Legislation

A few weeks ago, Appdetex published a blog with predictions for 2021, and admittedly, at the date of publication, there were already very clear indications that one prediction was already in flight. In our blog post, we'd said, "With the global domain name system failing to abate abuse, and, in fact, thwarting consumer protection, get ready for a patchwork of local laws targeting attribution and prosecution of bad actors... Get ready for some confusion and turmoil in the world of notice and takedown related to local laws and regulations." more

TLDs, CJD and Other Mad Cows

"At every crossroad on the road that leads to the future, tradition has placed against us ten thousand men to guard the past". These were the words of Stanley Prusiner in 1992 describing the opposition to his radical discovery of what he called prions, the causative agents of a clutch of baffling brain diseases. These include kuru, affecting New Guinea cannibals, Creutzfeldt-Jacob disease (CJD), and BSE or mad cow disease. And today these guardians of the past are in place again at the crossroad that leads to a future of thousands of top-level Internet domain names. more

gTLD Applicant Strategy: Clarifying Financial Questions (Part 1)

It is certainly proving to be a long and winding road for the 1923 gTLD applications submitted to ICANN. Glitches, delays and now a very high percentage of applications will very shortly be receiving clarifying (financial) questions on 26 November. Currently a very high percentage of applicants have not scored the required 8 points to pass financial evaluation. This is the next huge challenge for applicants. more

Vint Cerf’s Comments on the ISOC Sale of PIR and the .ORG Registry

Vint Cerf has posted comments in support of the pending sale of PIR and the .org registry to Ethos Capital. Vint's Comments . Vint is a respected member of the Internet community, and his comments need close attention and careful assessment. Some of his comments have been discussed here earlier. Other comments, posted here and elsewhere, have either supported the sale or raised questions. more

A New Low for the ICANN Multistakeholder Process

ICANN's dismissal of public comments submitted on the .COM Registry Amendment wasn't surprising given that it recently dismissed the public comments on the .Org Renewal Agreement, but the speed and disdain which it demonstrated was. Despite public pronouncements by ICANN President and CEO, Gören Marby and assurances from ICANN Board Chair, Maarten Botterman, that public comments were welcomed and that ICANN would take them seriously... more

SpaceX Starlink Service in Ukraine Is an Important Government Asset

At 4:04 AM on February 26 Mykhailo Fedorov, Vice Prime Minister and Minister of Digital Transformation of Ukraine requested Starlink service from Elon Musk and at 2:45 PM on the 26th, Elon Musk tweeted "Starlink service is now active in Ukraine. More terminals en route." On February 28 at 12:29 PM Fedorov posted a photo of a truck load of terminals. (Kyiv is 10 hours ahead of California). more

Topics

Threat Intelligence

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days