Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

DNS Abuse: A Litmus Test for ICANN

For a long time, arguments about the meaning of "DNS Abuse" prevented fruitful discussions within the ICANN community on when and how it is appropriate to act at the level of the DNS to address abuses online. The proposed amendments to RA and RAA agreements represent a significant and welcomed step in the right direction. As Secretariat of the Internet & Jurisdiction Policy Network (I&JPN), we strongly encourage their adoption... more

India: One Country, Many Internationalized Domain Names

If you're interested in learning more about Internationalized Domain Names (IDNs), UNESCO and EURid recently released a report on the evolution and challenges of IDNs. It's a good read and it highlights some of the struggles that countries and registries face and taking IDNs mainstream. Though Russia has so far proven to be a major success story - with more than 800,000 IDN registrations so far (and counting) - most other IDNs are have a long ways to go yet. more

ITU Staff Gone Wild

In virtually all governmental legislative bodies, the staff is there to provide secretariat services for the government representatives. The staff role does not include telling the representatives what decisions they should be making. The stricture is supposed to be the same at the International Telecommunication Union (ITU) for its treaty making activities. It is with some amazement that last week, the ITU secretariat staff showed up at a seminar in Bangkok they helped schedule... more

A Cool Simulation of SpaceX’s Revised Satellite Broadband Plan

On November 15, the FCC approved a revision to the plan for Starlink, SpaceX's forthcoming broadband satellite service. The new plan reduces the number of satellites from 4,525 to 4,409 and lowers the altitude of the phase-1 satellites from 1,100 to 550 km. Mark Handley, a professor at University College London, has created videos based on simulations he ran of both the original and revised phase 1 plans. more

FISMA Failings: Could EPA’s IT Defense Deficiencies Silence the Agency?

The possibility of unauthorized access to EPA information raises an array of concerns since EPA-held data includes various types of Confidential Business Information, scientific research data, environmental databases, agency plans for responding to "incidents of national significance" and other security-related matters, and environmental monitoring data used in regulatory enforcement actions. more

Wireless Innovations for a Networked Society

Last week, I had the honor of moderating an engaging panel discussion at Mozilla on the need for community networks and the important role they can play in bridging the digital divide. The panel highlighted the success stories of some of the existing California-based initiatives that are actively working toward building solutions to get under-served communities online. more

EURODIG Tbilisi 2018: Positioning in the New Complexity of the Global Internet Governance Ecosystem

Early June 2018 the European Internet community traveled into the Caucasian Mountains to participate in EURODIG 11. On its way into the digital age, Europe is, as EU Commissioner Mariya Gabriel said, at another crossroad. In cyberspace, Europe risks becoming sandwiched between US and Chinese Cyberpower policies. Social networks, search engines, smartphones, eTrade platforms - key sectors of today's digital economy - are dominated both by the US and Chinese giants: Alibaba and Amazon, Google and Baidu, Facebook and Weibo, Apple and Huawai. more

The Take Away from Global Payments Breach

Global Payments, an Atlanta-based payment card processing firm, announced yesterday that they had suffered "unauthorized access into a portion of its processing system". Sometime in early March they uncovered the attack, and there are some indications that the breach occurred between January 21st and February 25th of this year... There are a number of unverified reports that a New York City street gang with Central American ties took control of "an administrative account that was not protected sufficiently". more

The Economy, Not Surveillance or Weapons Systems, Is the Real Source of National Security

The worldwide public discussion about surveillance produced by the Snowden revelations has so far largely missed a major strategic fault with national security arguments for continued mass surveillance: that economic damage to the technology sector but more fundamentally to the wider economy is a likely result. This damage is also likely to undermine security far more than any potential gains from continuing as we are - or continuing but with some transparency or narrowing that leaves the existing industrial scale surveillance system largely unchecked. more

Bogus WSJ Story on Net Neutrality

Today's Wall Street Journal has a bogus, misleading story claiming that Google has been making deals with telephone and cable carriers that violate Network Neutrality. My BS detector was triggered by paragraph five, which reads: "One major cable operator in talks with Google says it has been reluctant so far to strike a deal because of concern it might violate Federal Communications Commission guidelines on network neutrality. 'If we did this, Washington would be on fire,' says one executive at the cable company who is familiar with the talks..." more

The Dumb Pipe Question

Every few years, I read something that resurrects the old question of whether ISPs should be dumb pipe providers or something more. Some ISPs have fought against the idea of being dumb pipe providers and want to believe they are far more than that. The latest event that raises this question anew is AT&T's debacle with ditching DirecTV and WarnerMedia. AT&T was clearly not content with being considered as only a dumb pipe provider. more

IPv6: Circling the IPv4 Wagons for a Last Stand

The last remaining stocks disappear from the shelves more quickly than ever before . . . IPv4 addresses that is. As the ARIN met in Toronto in April, an inordinate amount of time was spent yet again debating proposals on how to handle the dwindling stock of IPv4 addresses. I get the distinct impression that some people will still be tabling proposals and discuss the issue long after the last IPv4 block has been allocated by IANA and even the RIR's themselves. more

DMARC: New Email Authentication Protocol

A consortium of companies including Google, Microsoft, Facebook and Paypal have announced that they were collaborating and coming up with a new protocol known as DMARC -- the Domain-based Message Authentication, Reporting and Conformance. What is DMARC? more

Pay Me Now or Pay Me Later - A TMCH Story

As an industry insider and technologist, it's always tempting when discussing something new, such as the Trademark Clearinghouse (TMCH), to jump into the gritty details to try solving problems. However, in this case, we would be jumping a step ahead because it's fair to say most of the general community is not well informed about the current implementation challenges around the TMCH. more

IoT in Africa: Urgent Regulation Required

Globally, people are connecting more and more "things" to the Internet. Devices that were traditionally offline or dumb like refrigerators, cars, watches, home cameras, air condition, door locks, agriculture monitoring devices, etcetera, are now being connected to the Internet. This is referred to as the "Internet of Things" (IoT). Using sensors, IoT devices collect data of some sort, which is then most likely shared over a network connection to a service provider, where some analysis is performed on the data. more

Topics

Threat Intelligence

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days