Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Dusty Name System

Every IT person has some interaction with a DNS server, even if it is not managing it. Most DNS servers, certainly the majority are sitting in some closet or rack somewhere dutifully running and collecting dust. Like a certain battery operated bunny, these services just keep on running. The durability of DNS (Domain Name System, that is) is a testimony of just how well it was designed... How often do you think about your DNS server? Here is my plan for how to keep your relationship with your DNS server alive and well. more

Addressing Recent Media Mischaracterizations of the .ORG Acquisition

Given the level of public interest in Ethos' acquisition of Public Interest Registry ("PIR") from the Internet Society, it is no surprise that this agreement continues to attract press attention. Ethos welcomes open discussion on this important investment, and we are of course following the media coverage closely. Unfortunately, it is not always possible to respond point-by-point to every article, so I would like to take this opportunity to address several mischaracterizations of the deal recently reported by Wired, Deutsche Welle, and others. more

When CDA Immunity is Not CDA Immunity

Here's a question: If 47 USC 230(c) (the Good Samaritan provision of the Communications Decency Act) says that online services are not liable for third party content, then can you even sue the online service? Shouldn't the online service be immune from lawsuit? Because, after all, what would be the point of being sued for something for which you cannot be liable? more

Legal Threats Should Not Diminish ICANN’s Resolve

Guidebook for all interested parties. The best way to start this process would be to give conditional approval to the proposed final AGB next week. This may in fact involve acquiescing to the specific requests placed before it by litigious special interests, but those requests should be granted because they are reasonable and in the best interests of the program and its participants and stakeholders, not because ICANN feels it has to cave at the first sign of a gTLD opponent lawyering up. more

Move Fast and Regulate Things

The international community is converging on one notion at least: that Facebook cannot be prosecutor, judge and jury of its own achievements and transgressions. The calls to regulate social media companies first came from various legislative bodies, then from civil society and national policymakers, then from the CEO of Facebook itself, "to preserve what is best about [the Internet]." If some scepticism followed that was natural enough – was the company sincere in calling for more regulation? more

5G Carriers Hoping for Handouts

The Information Technology Industry Council (ITI) published a recent report that looks at "5G policy Principles and 5G Essentials for Global Policymakers." For those who don't know ITI, they are a DC-based lobbying group that represents most of heavy-hitter tech firms, and which works to help shape policy on tax, trade, talent, security, access, and sustainability issues. I don't think I've seen another document that so clearly outlines the hopes of the big US cellular companies. more

An Inquiry Into an Organization’s Security Priorities

In the wake of recent high-profile security incidents, I started wondering: what, generally speaking, should an organization's security priorities be? That is, given a finite budget - and everyone's budget is finite - what should you do first? More precisely, what security practices or features will give you the most protection per zorkmid? I suggested two of my own, and then asked my infosec-heavy Twitter feed for suggestions. more

Efficient Threat Intelligence: Learning the Secrets

How can our threat intelligence platform deliver more? This is a question many business professionals employing threat intelligence practices are asking themselves as their companies continue to fall short against the machinations of modern-day cybercriminals. The truth is that while threat intelligence is certainly not a silver bullet, organizations often make a mistake when they opt for a platform without considering several important factors that can help them evaluate the market better and deploy the practice more effectively. more

Healthy Domains Initiative Isn’t Healthy for the Internet

We had high hopes that the Domain Name Association's Healthy Domains Initiative (HDI) wouldn't be just another secretive industry deal between rightsholders and domain name intermediaries. Toward that end, we and other civil society organizations worked in good faith on many fronts to make sure HDI protected Internet users as well. Those efforts seem to have failed. more

Don’t Break out the Champagne Just Yet: More Work to Do Before IANA Transition Occurs

After two years of meetings, comment periods, and more meetings, the Internet Corporation for Assigned Names and Numbers submitted its IANA transition proposal to the US Department of Commerce last week at the end of the ICANN 55 meeting in Marrakech. While this is a critical milestone and the multi-stakeholder community should be commended for its efforts, several concerns still remain. more

Expression of Interest for New TLDs: Time to Shine!

Like many of those present at the ICANN Seoul meeting last October, and indeed along with those around the globe who were eagerly awaiting new TLDs, I too was angered and frustrated at ICANN's deadlines that were slipping like a cartoon character running on an oil slick, caused by an incessant search by certain industry factions for perfection in an imperfect science. (We do work with the internet remember?). more

Why We Need Broadband Regulation

Anybody that reads my blog posts knows that I am in favor of broadband regulation. I'm sure ISPs read this and wonder why -- because who doesn't like being unregulated? My feelings on this go back to basic economics - monopolies must either be regulated or split up. By definition, monopolies always end up taking advantage of consumers - unregulated monopolies really can't help this behavior because employees and management of monopolies will inevitably take advantage of monopoly market power. more

Do You See What I See? Geotargeting in Brand Infringements

Geotargeting is a well-established online technique for delivering tailored web content based on a user's geographic location. From an internet technology point of view, this is usually based on the user's IP address, which is converted to a physical location through a standard look-up process performed by network infrastructure. Geotargeting is commonly used by websites for several legitimate reasons, including providing users with relevant advertising and other content... more

“Open” or “Closed” Generic TLDs: Let the Operators Decide

(The following is an edited version of comments I submitted to ICANN regarding "closed" generic TLDs.) On February 5th, ICANN solicited comments on whether ICANN should determine the circumstances under which a generic TLD operator is permitted to adopt "open" or "closed" registration policies. Allowing gTLD operators to make these determinations, as opposed to ICANN, will promote innovation on the Internet to the benefit of consumers. more

Tactics for Responding to Cyber Attacks - Squeezing Your Cyber Response-Curve: Part 1

Many cyber attacks against companies today go unreported, and more still are undetected... Timing and context are everything. The faster a company identifies a problem, and the faster and deeper it is understood and its relevance to the business, the more effectively the company can respond. We call this squeezing the cyber response curve. This two-part post will discuss the current state of cyber threats, what the cyber response curve is and its impact your organization and how you can effectively squeeze this curve to improve attack response. more

Topics

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days