In the physical world of real estate, value is all about location, location, location. In the virtual world of enterprise business, value is all about performance. The catch is that enterprise performance today is often driven by... location, location, location. When it comes to your digital transformation, and the migration of services to the cloud, the location of your data is paramount. To reach a customer looking to complete an on-line purchase or enable a group of employees trying to collaborate on a shared document, data needs... more
Domain names that can be rapidly acquired, used in an attack, and abandoned before they can be traced are a critical resource for cybercriminals. Some attacks, including spam and ransomware campaigns and criminal infrastructure operation (e.g., "botnets"), benefit particularly from the ability to rapidly and cheaply acquire very large numbers of domain names – a tactic known as bulk registration. more
The UK cares about its citizens' privacy to the tune of a $229 million (US) fine of British Airways for a breach that disclosed information of approximately half a million customers. It's exciting -- a significant fine for a significant loss of data. I think GDPR will lead to improved security of information systems as companies scramble to avoid onerous fines and start to demand more from those who provide information security services and products. more
One of the hottest topics in the news related to coronavirus is working from home. Companies of all sizes are telling employees to work from home as a way to help curb the spread of the virus. Companies without work-at-home policies are scrambling to define how to make this work to minimize disruption to their business. Allowing employees to work at home is not a new phenomenon. more
I've been following the "white spaces" for as long as it has been happening -- four, maybe five years -- and I must admit that I am surprised by FCC Chairman Kevin Martin's sudden fondness for them. Until the last days of his chairmanship, Martin never cared for this somewhat radical notion: allowing techies and community activists to spew electromagnetic frequencies in zones currently occupied (at least ostensibly) by the broadcasters. more
For close to 15 years, when it comes to domain name management, I've personally touted two things: 1) the importance of using a single, secure, corporate domain name registrar and 2) the importance of having a fully-consolidated domain name portfolio for even the largest portfolios. And in many ways, this made sense back then. With a single, corporate-focused registrar, domain professionals were able to access and manage all domains from within a centralized repository. more
With DNSSEC for the root zone going into production in a couple of weeks, it is now possible for Top Level Domain (TLD) managers to submit their Delegation Signer (DS) information to IANA. But what does this really mean for a TLD? In this post we're going to try to sort that out. more
The U.S. Government's decision to transition its legacy role as the administrator of the IANA functions contract to the global multi-stakeholder community is an important step in the continued evolution of the Internet. While the Motion Picture Association of America (MPAA) supports this transition, we strongly believe that a comprehensive accountability framework, developed, agreed to and approved by the multi-stakeholder community must be in place in advance of finalizing any IANA transition recommendations. more
In part four of this series of posts looking at emerging internet content relating to coronavirus, we explore phishing. In times of crisis, cyber criminals invariably take advantage of the growing concerns of the public. In the case of the coronavirus, they have done so by sending phishing emails that play on the fears surrounding the spread of the illness. A number of reports have emerged of emails purporting to provide advice or assistance relating to COVID-19... more
Google and ETECSA have signed a memorandum of understanding agreeing to negotiate a peering agreement that would allow cost-free data exchange between their networks once an undersea cable physically connects them. Google has worked hard to establish a relationship with ETECSA and the Cuban government. In recent years, Cuba, not the US, has limited the Cuban Internet. This agreement telegraphs a change in Cuban policy. more
For well over a decade, it was fairly easy to understand the trajectory of the broadband industry. In the residential market, cable companies snagged all the growth while telcos shrank as customers abandoned DSL. Other technologies like fiber or fixed wireless gained customers but were a blip on the national scale. more
As technology gets more and more sophisticated, tech-savvy cybercriminals are having a field day devising increasingly ingenious ways to steal confidential data from ill-prepared targets. What this means is that an equally sophisticated cybersecurity response is needed to keep attackers at bay. This would involve re-examining reactive cybersecurity practices and adopting a proactive approach towards an active search for risks and vulnerabilities with the help of threat intelligence (TI). more
Time to brush the dust off your Computer II notebooks. Are voicemail, electronic fax, and call forwarding enhanced services or telecom services? Today's case: FTC v. American eVoice, Ltd... The FTC brought an action against Defendants claiming that they were engaged in cramming, adding unwanted voicemail, electronic fax, and call forwarding services to consumers bills to the tune of $70 million. more
Several weeks ago ICANN issued clarifying questions to approximately 50 of the 1,930 new gTLD applications submitted last spring. Some of our clients were selected for this pilot effort and we've had the opportunity to review seven sets of clarifying questions totaling approximately 30 individual questions. ICANN has indicated that in late November they will begin issuing Clarifying Questions to the balance of applicants. more
Today's Senate hearing with Facebook's Mark Zuckerberg will start a long discussion on data collection and privacy from Internet companies. Although the spotlight is currently on Facebook, we shouldn't forget that the picture is broader: companies from device manufacturers to ISPs collect network traffic and use it for a variety of purposes. more
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byRadix
Sponsored byWhoisXML API
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byCSC