We are all aware of the steps for mitigating the spread of the novel coronavirus (COVID-19): Wash your hands; Practice social distancing; Report exposure.But these are not the only activities to practice right now. Cyber-criminals are taking advantage of this health crisis and the emotional upheaval it creates to perpetrate their crimes. Therefore, we also need to exercise good internet hygiene. In a time of crisis or tragedy, bad actors don't slow down; their efforts amplify. more
The Kingdom of Saudi Arabia (KSA) will host the Internet Governance Forum in December. There are four main themes -- innovation and risk; the impact of technology on peace and development; using technology to advance human rights; and improving digital governance. Every IGF is a unique and annual opportunity for thousands of people engaged in key issues to come together and engage. KSA is hosting for the first time, and it is an exciting prospect. more
It has been 1.5 years since I have started my journey with ICANN. Within this short journey of mine, looking back I remember a nice memory that makes me love ICANN more and forces me to get involved even deeper. I got to know about ICANN in the APNIC conferences. I didn't really get the enormity of ICANN until I attended my first ICANN meeting in Copenhagen, Denmark in March 2017 as a fellow. more
The City of Shanghai entered the low-orbit broadband satellite market. Shanghai Spacecom Satellite Technology (SSST) launched 18 satellites in August and a second batch of 18 satellites in October. The satellites are being branded as Qianfan, or 'Thousand Sails.' SSST satellites are being launched by the China Aerospace Science and Technology Corporation (CASC) using the Long March 6A rocket. more
In my recent article on mark similarity measurement, I discussed a possible framework for protecting colour marks. The framework involves the specification of each colour according to its RGB (red-green-blue) specification (in which each component is expressed as an integer value between 0 and 255), with the suggestion that the protection afforded by a colour trademark could incorporate not only this exact colour, but also all similar colours around it up to a certain 'distance'... more
On October 20th, ICANN and Verisign renewed the agreement under which Verisign will continue to act as Root Zone Maintainer for the Domain Name System (DNS) for another 8-year term. The Root Zone sits atop the hierarchical architecture of the DNS and is essential to virtually all internet navigation, acting as the dynamic, cryptographically secure, global directory of all top-level domains that exist in the DNS. more
The internet has come to play a vital role in the social and economic development of the Caribbean. Yet, countries in the region are, in the main, relying heavily on external interests to make important decisions about the technical specifications and security of the technology and rules that impact how the Internet is governed. "We find that the Caribbean governments are abdicating their seats at the table in global fora where major decisions are made regarding the future of the Internet. more
If it feels like the work of the latest group addressing registration data within ICANN has been going on forever, try participating in it! Since the summer of 2018, the team has regularly been meeting for several hours each week, participating in numerous face-to-face meetings and exchanging thousands of emails. Last week in Los Angeles, the team got together once again to continue our Phase 2 work creating policy that will (among other issues) govern the disclosure of non-public registration data to third parties. more
The "Decoding Internet Governance Stakeholders" series of articles invites the community to ponder what underlies the labels that define our interactions, roughly 20 years after the "Tunis Agenda for the Information Society" called for the "full involvement of governments, business entities, civil society and intergovernmental organizations", as well as to "make full use of the expertise of the academic, scientific and technical communities". more
State and county election officials across the country employ thousands of computers in election administration, most of them are connected (from time to time) to the internet (or exchange data cartridges with machines that are connected). In my previous post I explained how we must audit elections independently of the computers, so we can trust the results even if the computers are hacked. more
Cloud computing is on the rise. International Data Corp. predicts a $195 billion future for public cloud services in just four years. That total is for worldwide spending in 2020 - more than twice the projection for 2016 spending ($96.5 billion). As a result, companies are flocking to both large-scale and niche providers to empower cloud adoption and increase IT efficacy. The problem? Without proper management and oversight, cloud solutions can end up underperforming, hampering IT growth or limiting ROI. more
How bad is the human security weakness problem? Verizon's 2022 Data Breaches Investigations Report says 82 percent of data breaches have human involvement. This involvement can mean misconfigurations, poor security policy implementation, negligence, and falling prey to social engineering schemes. Essentially, a vast majority of data breaches have penetrated cyber defenses because of human carelessness, inconsistencies, and gullibility. more
A recent article in the Wall Street Journal discusses the possible contamination of copper telephone cables with outer lead sheathing. I'm not linking to the article because it is behind a paywall, but this is not a new topic, and it's been written about periodically for decades. The authors looked at locations around the country where lead cables are still present around bus stops, schools, and parks. more
In the world of DNS, there are two types of DNS servers, 'recursion disabled' and 'recursion enabled'. Recursion disabled servers, when asked to resolve a name, will only answer for names that they are authoritative for. It will absolutely refuse to look up a name it does not have authority over and is ideal for when you don't want it to serve just any query. It isn't, however, very useful for domains you don't know about or have authority over... more
As we have seen in the first installment of this series, TR-069 offers unprecedented visibility into the customer premises network to highlight devices beyond the gateway, and in the case of WiFi, the issues affecting service quality. Insights into the surrounding WIFI landscape alone provide ample data to provision the access point (AP) to operate in a part of the spectrum with the least amount of interference. more
Sponsored byCSC
Sponsored byIPv4.Global
Sponsored byRadix
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byVerisign