In the business world, there are two main paths a company can take with cybersecurity -- the reactive and the proactive approach. The problem with a purely reactive attitude is that it can easily put companies in constant firefighting mode. And for small companies with limited resources, this can turn out to be an increasingly uncomfortable place to be in.
With that in mind, experts today suggest proactive cybersecurity by monitoring suspicious activity and identifying risks before they turn into full-blown attacks. more
The ICANN community review and Board approval of the draft Bylaws intended to implement the Work Stream 1 (WS1) recommendations of the Cross-Community Working Group on Accountability (CCWG-ACCT) are nearing completion. As we approach that marker, it is worth remembering that a major impetus for the approaching transition of IANA functions control away from the U.S. Government (USG) to the multistakeholder community was the notion that termination of the remaining "clerical function" performed by the USG within the context of the current IANA contract would dampen criticism of ICANN's relationship with the USG... more
The recent decision by ICANN to start a new round of applications for new generic Top-Level Domains (gTLDs) is launching a round of questions on the IETF side about its consequences. One possible issue may be with vanity gTLDs like apple, ebay etc. Some expect that every Fortune 1,000,000 company will apply for its own TLD. My guess is rather the Fortune 1,000 for a start, but this does not change the nature of the issue, i.e. those companies may want to use email addresses like user@tld. more
Turning network technical protocols into religion seems like an inherently bad idea -- transient and unstable at best. However, it happens. More than 40 years ago, the world of legacy telecommunications and network design formalism started the tendency with OSI (Open Systems Interconnection) and ISDN (Integrated Services Digital Networks). A few years later, the academic research community did it with their myriad host-to-host datagram protocols -- eventually calling one "the Internet." more
A few days ago I opined that if several people want the same Top-Level Domain (TLD) and can't come to terms otherwise, they should arrange a private auction. It would be an odd sort of auction, since the buyers and sellers are the same people, so unlike normal auctions, the goal is not to maximize the selling price. How might it work? more
"Is Google Turning Into a Mobile Phone Company?" asks the headline in Andrew Ross Sorkin's New York Times story. Wrong question, IMHO. But is Google doing the deal at least partly to give it leverage over wireless providers? I think so. The biggest threat to the growth of Smart Phones and tablets and other Google businesses like YouTube is the imposition of data caps and metered pricing by wireless providers like at&t and Verizon Wireless. more
Every time new concepts are introduced, much debate ensues as to the advantages and disadvantages such a change would bring forth. We've seen that happen with the launch of IPv6. Detractors and supporters rallied to make their respective arguments heard. One thing is sure though. The need for a much larger IP address space is something both parties are in agreement with. more
As an admin, app security should be a top priority - but SaaS apps represent a difficult challenge in that regard. How can you protect your business from their risks, while enjoying all their rewards? Within the average enterprise, there are 508 unique cloud applications in use. That number's overwhelming enough on its own without considering that 88% of those applications aren't enterprise ready, or the fact that one in five cloud applications has data sharing as a core functionality. more
We regularly check the status of IPv6 deployment in the RIPE NCC service region, and in other service regions as well. One way to measure IPv6 deployment is to look at the percentage of networks announcing IPv6 prefixes and follow the developments over time. The RIPE NCC's IPv6-ASN graph shows the percentage of networks that announce one or more IPv6 prefixes in the global routing system. Having an IPv6 prefix visible in the global routing system is a required step for a network to actually start exchanging IPv6 traffic with other networks. more
Internet Governance, like all governance, needs to be founded in guiding principles from which all policy making is derived. There are no more fundamental principles to guide our policy making than the Universal Declaration of Human Rights, (UDHR). This article as Part 5 of the series of articles (published in installments), and we are revisiting Article 15 to look at empowered Digital Citizenship and Internet Governance, to move on to the rights to a family and property more
With the application launch period scheduled to begin in less than three months, everyone wants to know just how many new generic Top-Level Domains (gTLDs) applications will be submitted. In terms of the number of applications to be submitted, I've seen estimates putting the figure as low as 500. But just last week, an industry insider told me that he thought the number could go as high as 3,500. more
In connection with the recent publication of the IANA RFP, there have been some commenters that have proclaimed that removing the requirement of the Contractor to document the consensus of relevant stakeholders in connection with the delegation of new gTLDs from the original draft Statement of Work as a win for ICANN. However, when reading the recently revised IANA RFP language in light of the Government Advisory Committee (GAC) Dakar Communiqué, a rather compelling legal case can be made... more
Last week I wrote about the arrival of a truckload of SpaceX Starlink terminals in Ukraine and their potential value to government and resistance leaders. A lot has happened in the ensuing week - this is an update. Last week, using Mike Puchol's Starlink tracking service, I found that users in Kyiv would have 100 percent uptime with connections through as many as nine satellites to ground stations in Turkey, Poland, and Lithuania. more
Months ago, while watching a Saturday Night Live skit about non-fungible tokens (NFT) featuring a parody of Janet Yellen speaking to a high school economics class, I realized what an NFT is and how they work. What they represent, how they are minted, and how their value is exchanged became clear while watching Pete Davidson in a boy wonder unitard rap about the latest crypto-phenomena. It was only later that I realized that NFTs have plenty of practical applications. more
VoIP has been banned across most of Africa for a long time, feared by the state-owned telcos as a way for alternative service providers to bypass them with international calls, eroding a very lucrative part of their business. At profit margins of several thousand percent in some cases, it is not surprising that unlicensed operators have sprung up all over the continent, risking huge fines, confiscation of their equipment and even jail terms. more
Sponsored byVerisign
Sponsored byCSC
Sponsored byRadix
Sponsored byDNIB.com
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byIPv4.Global