Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Prime Real Estate in the Cloud

In the physical world of real estate, value is all about location, location, location. In the virtual world of enterprise business, value is all about performance. The catch is that enterprise performance today is often driven by... location, location, location. When it comes to your digital transformation, and the migration of services to the cloud, the location of your data is paramount. To reach a customer looking to complete an on-line purchase or enable a group of employees trying to collaborate on a shared document, data needs... more

Cybercriminals Weaponize Bulk-Registered Domain Names

Domain names that can be rapidly acquired, used in an attack, and abandoned before they can be traced are a critical resource for cybercriminals. Some attacks, including spam and ransomware campaigns and criminal infrastructure operation (e.g., "botnets"), benefit particularly from the ability to rapidly and cheaply acquire very large numbers of domain names – a tactic known as bulk registration. more

GDPR Fine Enough or More Disclosure?

The UK cares about its citizens' privacy to the tune of a $229 million (US) fine of British Airways for a breach that disclosed information of approximately half a million customers. It's exciting -- a significant fine for a significant loss of data. I think GDPR will lead to improved security of information systems as companies scramble to avoid onerous fines and start to demand more from those who provide information security services and products. more

Most Employees in Rural America Can’t Work From Home Due to Lack of Required Broadband Speeds

One of the hottest topics in the news related to coronavirus is working from home. Companies of all sizes are telling employees to work from home as a way to help curb the spread of the virus. Companies without work-at-home policies are scrambling to define how to make this work to minimize disruption to their business. Allowing employees to work at home is not a new phenomenon. more

The Real White Spaces Debate: To Create or Abolish a Market in the Airwaves

I've been following the "white spaces" for as long as it has been happening -- four, maybe five years -- and I must admit that I am surprised by FCC Chairman Kevin Martin's sudden fondness for them. Until the last days of his chairmanship, Martin never cared for this somewhat radical notion: allowing techies and community activists to spew electromagnetic frequencies in zones currently occupied (at least ostensibly) by the broadcasters. more

Corporate Domain Management in 2019: Consolidated Portfolio or Two-Vendor Approach – Why Not Both?

For close to 15 years, when it comes to domain name management, I've personally touted two things: 1) the importance of using a single, secure, corporate domain name registrar and 2) the importance of having a fully-consolidated domain name portfolio for even the largest portfolios. And in many ways, this made sense back then. With a single, corporate-focused registrar, domain professionals were able to access and manage all domains from within a centralized repository. more

Top Level Domains and a Signed Root

With DNSSEC for the root zone going into production in a couple of weeks, it is now possible for Top Level Domain (TLD) managers to submit their Delegation Signer (DS) information to IANA. But what does this really mean for a TLD? In this post we're going to try to sort that out. more

Ensuring a Strong ICANN Accountability Framework

The U.S. Government's decision to transition its legacy role as the administrator of the IANA functions contract to the global multi-stakeholder community is an important step in the continued evolution of the Internet. While the Motion Picture Association of America (MPAA) supports this transition, we strongly believe that a comprehensive accountability framework, developed, agreed to and approved by the multi-stakeholder community must be in place in advance of finalizing any IANA transition recommendations. more

Coronavirus Online Threats Going Viral, Part 4: Phishing

In part four of this series of posts looking at emerging internet content relating to coronavirus, we explore phishing. In times of crisis, cyber criminals invariably take advantage of the growing concerns of the public. In the case of the coronavirus, they have done so by sending phishing emails that play on the fears surrounding the spread of the illness. A number of reports have emerged of emails purporting to provide advice or assistance relating to COVID-19... more

Google and ETECSA Will Agree to Exchange Internet Traffic Without Charge

Google and ETECSA have signed a memorandum of understanding agreeing to negotiate a peering agreement that would allow cost-free data exchange between their networks once an undersea cable physically connects them. Google has worked hard to establish a relationship with ETECSA and the Cuban government. In recent years, Cuba, not the US, has limited the Cuban Internet. This agreement telegraphs a change in Cuban policy. more

Is Call Forwarding an “Information Service” and Why It Matters for FTC Jurisdiction

Time to brush the dust off your Computer II notebooks. Are voicemail, electronic fax, and call forwarding enhanced services or telecom services? Today's case: FTC v. American eVoice, Ltd... The FTC brought an action against Defendants claiming that they were engaged in cramming, adding unwanted voicemail, electronic fax, and call forwarding services to consumers bills to the tune of $70 million. more

The Trajectory of the Broadband Industry

For well over a decade, it was fairly easy to understand the trajectory of the broadband industry. In the residential market, cable companies snagged all the growth while telcos shrank as customers abandoned DSL. Other technologies like fiber or fixed wireless gained customers but were a blip on the national scale. more

Threat Intelligence Platform in Action: Investigating Important Use Cases

As technology gets more and more sophisticated, tech-savvy cybercriminals are having a field day devising increasingly ingenious ways to steal confidential data from ill-prepared targets. What this means is that an equally sophisticated cybersecurity response is needed to keep attackers at bay. This would involve re-examining reactive cybersecurity practices and adopting a proactive approach towards an active search for risks and vulnerabilities with the help of threat intelligence (TI). more

6th Registration Operations Workshop (ROW), Madrid, Friday May 12th 2017

The Registration Operations Workshop (ROW) was conceived as an informal industry conference that would provide a forum for discussion of the technical aspects of registration operations in the domain name system. The 6th ROW will be held in Madrid, on Friday May 12th 2017 in the afternoon, immediately after the GDD Industry Summit and prior to ICANN DNS Symposium and OARC 26, using the same venue as all above-mentioned events. more

ICANN Clarifying Questions - How Are They Structured? (Part 1 of 3)

Several weeks ago ICANN issued clarifying questions to approximately 50 of the 1,930 new gTLD applications submitted last spring. Some of our clients were selected for this pilot effort and we've had the opportunity to review seven sets of clarifying questions totaling approximately 30 individual questions. ICANN has indicated that in late November they will begin issuing Clarifying Questions to the balance of applicants. more

Topics

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

DNS Security

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days