Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Proactive Cybersecurity: What Small Businesses Can Actually Do

In the business world, there are two main paths a company can take with cybersecurity -- the reactive and the proactive approach. The problem with a purely reactive attitude is that it can easily put companies in constant firefighting mode. And for small companies with limited resources, this can turn out to be an increasingly uncomfortable place to be in.
With that in mind, experts today suggest proactive cybersecurity by monitoring suspicious activity and identifying risks before they turn into full-blown attacks. more

The Irritating Irresolution of ICANN Jurisdiction

The ICANN community review and Board approval of the draft Bylaws intended to implement the Work Stream 1 (WS1) recommendations of the Cross-Community Working Group on Accountability (CCWG-ACCT) are nearing completion. As we approach that marker, it is worth remembering that a major impetus for the approaching transition of IANA functions control away from the U.S. Government (USG) to the multistakeholder community was the notion that termination of the remaining "clerical function" performed by the USG within the context of the current IANA contract would dampen criticism of ICANN's relationship with the USG... more

New Generic Top-Level Domains and Internet Standards

The recent decision by ICANN to start a new round of applications for new generic Top-Level Domains (gTLDs) is launching a round of questions on the IETF side about its consequences. One possible issue may be with vanity gTLDs like apple, ebay etc. Some expect that every Fortune 1,000,000 company will apply for its own TLD. My guess is rather the Fortune 1,000 for a start, but this does not change the nature of the issue, i.e. those companies may want to use email addresses like user@tld. more

Internet Religious Wars: Net Neutrality Episode

Turning network technical protocols into religion seems like an inherently bad idea -- transient and unstable at best. However, it happens. More than 40 years ago, the world of legacy telecommunications and network design formalism started the tendency with OSI (Open Systems Interconnection) and ISDN (Integrated Services Digital Networks). A few years later, the academic research community did it with their myriad host-to-host datagram protocols -- eventually calling one "the Internet." more

ICANN’s New TLDs: Of Course There Will Be an Auction - Part 2

A few days ago I opined that if several people want the same Top-Level Domain (TLD) and can't come to terms otherwise, they should arrange a private auction. It would be an odd sort of auction, since the buyers and sellers are the same people, so unlike normal auctions, the goal is not to maximize the selling price. How might it work? more

Will Googlerola Be Able to Fight Data Caps?

"Is Google Turning Into a Mobile Phone Company?" asks the headline in Andrew Ross Sorkin's New York Times story. Wrong question, IMHO. But is Google doing the deal at least partly to give it leverage over wireless providers? I think so. The biggest threat to the growth of Smart Phones and tablets and other Google businesses like YouTube is the imposition of data caps and metered pricing by wireless providers like at&t and Verizon Wireless. more

The Pros and Cons of Introducing New gTLDs

Every time new concepts are introduced, much debate ensues as to the advantages and disadvantages such a change would bring forth. We've seen that happen with the launch of IPv6. Detractors and supporters rallied to make their respective arguments heard. One thing is sure though. The need for a much larger IP address space is something both parties are in agreement with. more

The Sysadmin’s Guide to Securing Your SaaS Apps

As an admin, app security should be a top priority - but SaaS apps represent a difficult challenge in that regard. How can you protect your business from their risks, while enjoying all their rewards? Within the average enterprise, there are 508 unique cloud applications in use. That number's overwhelming enough on its own without considering that 88% of those applications aren't enterprise ready, or the fact that one in five cloud applications has data sharing as a core functionality. more

Networks Announcing IPv6 Over Time: A Short Update

We regularly check the status of IPv6 deployment in the RIPE NCC service region, and in other service regions as well. One way to measure IPv6 deployment is to look at the percentage of networks announcing IPv6 prefixes and follow the developments over time. The RIPE NCC's IPv6-ASN graph shows the percentage of networks that announce one or more IPv6 prefixes in the global routing system. Having an IPv6 prefix visible in the global routing system is a required step for a network to actually start exchanging IPv6 traffic with other networks. more

Internet Governance and the Universal Declaration of Human Rights, Part 5: Article 15-17

Internet Governance, like all governance, needs to be founded in guiding principles from which all policy making is derived. There are no more fundamental principles to guide our policy making than the Universal Declaration of Human Rights, (UDHR). This article as Part 5 of the series of articles (published in installments), and we are revisiting Article 15 to look at empowered Digital Citizenship and Internet Governance, to move on to the rights to a family and property more

What Will Be the Magic Number for New gTLD Applications?

With the application launch period scheduled to begin in less than three months, everyone wants to know just how many new generic Top-Level Domains (gTLDs) applications will be submitted. In terms of the number of applications to be submitted, I've seen estimates putting the figure as low as 500. But just last week, an industry insider told me that he thought the number could go as high as 3,500. more

IANA Checkmate - Fool Me Once, Shame on You, Fool Me Twice Shame on Me

In connection with the recent publication of the IANA RFP, there have been some commenters that have proclaimed that removing the requirement of the Contractor to document the consensus of relevant stakeholders in connection with the delegation of new gTLDs from the original draft Statement of Work as a win for ICANN. However, when reading the recently revised IANA RFP language in light of the Government Advisory Committee (GAC) Dakar Communiqué, a rather compelling legal case can be made... more

SpaceX Starlink in Ukraine – a Week Later

Last week I wrote about the arrival of a truckload of SpaceX Starlink terminals in Ukraine and their potential value to government and resistance leaders. A lot has happened in the ensuing week - this is an update. Last week, using Mike Puchol's Starlink tracking service, I found that users in Kyiv would have 100 percent uptime with connections through as many as nine satellites to ground stations in Turkey, Poland, and Lithuania. more

Protecting Your Brand in the New World of NFTs

Months ago, while watching a Saturday Night Live skit about non-fungible tokens (NFT) featuring a parody of Janet Yellen speaking to a high school economics class, I realized what an NFT is and how they work. What they represent, how they are minted, and how their value is exchanged became clear while watching Pete Davidson in a boy wonder unitard rap about the latest crypto-phenomena. It was only later that I realized that NFTs have plenty of practical applications. more

Unlimited VoIP Offers Starting to Appear in Africa

VoIP has been banned across most of Africa for a long time, feared by the state-owned telcos as a way for alternative service providers to bypass them with international calls, eroding a very lucrative part of their business. At profit margins of several thousand percent in some cases, it is not surprising that unlicensed operators have sprung up all over the continent, risking huge fines, confiscation of their equipment and even jail terms. more

Topics

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Threat Intelligence

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days