Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Remediating U.S. 5G Global Supply Chain Security Engagement

For nearly the past four years, the Trump Administration has purported to treat 5G supply chain security through empty political gestures such as network equipment banning. The disinformation reached its absurd zenith subsequent to the election with the Q-Anon myth of the Kraken. (The Myth advanced by Trump attorneys asserted the long-deceased Hugo Chavez working with China was corrupting voting machine software to deprive Trump of another term.) more

New gTLD Target Date is April 23? Or is it?

I detect some delight in the domain name community today resulting from Video interview with ICANN CEO Fadi Chehadé. In that interview Chehadé states "We are now targeting to be able to recommend for delegation the first new gTLD as early as the 23rd of April..." On the surface this sounds like very good news. more

Why are *.edu’s Compromised so Much?

When it comes to the problem of outbound spam, one of the experiences that I have, and this was reaffirmed at TechEd, is that the number one source of compromised accounts are educational institutions. That is to say, whenever we have an outbound spam problem and have to hunt down where it is coming from, the highest number of these accounts are phished accounts/credentials from users at an educational institution. Why is this? Why does so much spam originate from universities? more

Broadband Challenge Isn’t About Plumbing

It seems to me that too many people have focused government attention on intervening in the supply of broadband facilities. Let's face it, it is easier to look at a dozen or so suppliers to gather information and figure out who should receive a cheque to help direct their investment in broadband facilities. On the other side of the equation, it is hard work to stimulate demand. But this is precisely where our efforts should be focused, as was recommended by the recent report... more

Securing a Cloud Infrastructure

George Reese (author of the new book Cloud Application Architectures: Building Applications and Infrastructure in the Cloud) is talking at Gluecon about securing cloud infrastructures. Two recent surveys found "security" was the number one concern of companies considering a move to the cloud. George says the key to making customers comfortable with cloud security is transparency... more

Out of .Africa - Process Failures Don’t Change the Facts

I've heard a lot of discussion of the .africa controversy of late -- from conspiracy theories to questions about staff competence to concerns about the role of the GAC. And it's hard not to find faults galore in the way this process and the IRP reporting has played out. But before we get too lost in the weeds of procedure or the future of ICANN, lets not lose track of what this debate was first and still is fundamentally about: a string. more

3 Reasons It’s Crucial to Review Your Domain Lock Portfolio Now

Just as we started the new year, the U.S. Department of Homeland Security's Cybersecurity and Infrastructure Security Agency's (CISA) issued an alert. On January 6, 2020 , they warned of domain name system (DNS) hijacking and other cyber threats that may be used by nation-state threat actors to disrupt business activity and take control of vital internet assets. A familiar refrain heard in 2019 now repeating in 2020. more

What’s the ROI on a $20m TLD Auction?

ICANN have taken a solid stance in regards to contention sets, with those yet to be resolved soon to be forced into auctions of last resort in the coming months. As expected, this has increased the velocity of private settlements between applicants, either via deals or private auctions. It seems like most applicants (wisely) don't want to see their funds going into ICANN coffers unnecessarily. more

Closing the Gaps: The Quest for a Secure Internet

Over the last year the world has been virtually buried under news items describing hacks, insecure websites, servers and scada systems, etc. Each and every time people seem to be amazed and exclaim "How is this possible?" Politicians ask questions, there is a short lived uproar and soon after the world continues its business as usual. Till the next incident. In this blog post I take a step back and try to look at the cyber security issue from this angle... more

Singapore’s Fiber Infrastructure Beginning to Pay Off

It's still early days, but Singapore's approach to fiber deployment is beginning to pay off. In December 2007, Singapore announced a major program to get fiber deployed throughout their city state. A critical advantage of their approach was government mandated structural separation between the dark fiber layer deployed in the public right-of-way (a natural monopoly) and higher layer services (where competition is possible and highly desirable. more

The Internet (and ICANN) After the Trump Apocalypse

Three months ago, I pondered the question Would the Internet Survive a Trump Apocalypse? As improbable as that outcome was in August, enough of the American electorate has "pulled the pin" to bring it on. It is a brave new world -- distinctly darker and more uncertain. At the moment, the Trump team is trying to figure out how to manifest their vacuous invectives masquerading as policy. The world is watching, and Washington looks like the scene in Ghostbusters where the containment grid has just been turned off, and the demonic ghosts are rising from the underbelly of K-Street. The result here is a Washington lobbying dream -- a result rather different than that promised to naïve Trump devotees. more

Telecom in China: After the Dust Settles

The long rumored reorganization of the telecommunications sector in China has begun. Now China will have three major companies, each with both mobile and fixed networks. The focus for fixed network growth is broadband Internet access. The focus for mobile will be continued growth in mobile subscribers and the launch of 3G services, with the three companies using three different 3G technologies. more

Balancing Rights: Mark Owners, Emergent Businesses, and Investors

Is there any act more primary than naming? It comes before all else and makes possible what follows. For the most part, names are drawn from cultural assets: collections of words, geographic locations, family names, etc. They can be valuable, which is why they are guarded, protected, and hoarded. The balancing of rights among those competing for names is a deliberate feature of the Uniform Domain Name Dispute Resolution Policy (UDRP). more

Big Data for the Common Good of Local Communities

There is no doubt that big data is going to be one of the most important tools that will assist human society in the future. Our increasingly complex society has been able to move forward, and it will continue to do so, based on rational, scientific facts and figures within the context of the needs of humanity. As an example, neuroscience is giving us more insight into ourselves, and we are learning that many of the elements that we have always thought of as being uniquely human are based on neurological/biological processes that can be put into algorithms. more

Leadership and Persuasion: Internet Freedom

Secretary Clinton's major address on internet freedom made the connection between humanity and technology. We've been waiting a long time for our political leaders to have the courage to express thoughts like this, to have a vision about the role of the internet in human history, and yesterday the day arrived. The speech wasn't an isolated event, of course. more

Topics

Threat Intelligence

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days