Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

A Look Ahead to Fedora 19

Fedora 19 is the community-supported Linux distribution that is often used as a testing ground for features that eventually find their way into the Red Hat Enterprise Linux commercial distribution and its widely used noncommercial twin, CentOS. Both distributions are enormously popular on servers and so it's often instructive for sysadmins to keep an eye on what's happening with Fedora. more

Brand Abuse and IP Infringements – Part 1: Brand Impact

In this two-part blog series, we take a closer look at brand abuse and intellectual property (IP) infringements. In this first article, we explore the components making up a company's IP and how online content can affect a brand's value, both actual and perceived... The IP held by an organization -- i.e., the portfolio of brands, trademarks, and other intangible assets that provide it with its distinctiveness, and protect it from unfair competition in the marketplace... more

Quantifying the Benefits of Fiber

Dr. Bento J. Lobo, an economist at the University of Tennessee at Chattanooga undertook a study to quantify the benefits of the municipally-owned fiber network in Chattanooga. Any citywide fiber network brings economic development to a community, but a municipally-owned system brings additional benefits because of the way that the business is more deeply integrated into the community. more

Update on Assigning 32-bit ASNs

As mentioned in Assigning 32-bit ASNs published one year ago, 16-bit Autonomous System Numbers (ASNs) are becoming a scarce resource just like 32-bit IP addresses. In 2007, the Internet Engineering Task Force (IETF) addressed this scarcity by developing a new format: 32-bit AS Numbers (RFC 4893), which increased the supply of ASNs to four billion. more

Application Delivery Controllers as Safety Net for Ad Servers

Ad serving platforms drive a lot of web site revenue. These software platforms grant a site manager control over local or remote ads appearing on his web site. Over the years these platforms grew in functionality and today they offer diverse functions... Performance issues on such a platform can take down the ads on dozens of different sites, causing massive loss of revenues to the site and the platform owners. more

Better Than Best Efforts Routing of Mission Critical Traffic and the FCC

It appears that the FCC will permit exceptions to the standard, plain vanilla best efforts routing standard for Internet traffic, such as the paid peering arrangement recently negotiated between Comcast and Netflix. In both academic and applied papers I have supported this option, with several major conditions... With no opposition that I have seen, companies like Akamai offer better than best efforts routing of "mission critical" traffic from content source to last mile, "retail" Internet Service Providers. more

ICANN Voting to Pull the Weeds is Good - Pulling Them is Even Better

At the ICANN Public Forum in Singapore yesterday, I likened the ICANN to a community garden: fertile, colorful and above all, worthwhile, but not without a few troublesome weeds. Today's Board vote to adopt the recommendations of the Accountability and Transparency Review Team (ATRT) is a vote to pull those weeds. As good as voting for this weed-pulling exercise is, completing it will be even better. more

In a Networked World Knowing the Right Time Is Essential but How Accurate Are the Computer Clocks?

Computers have always had clocks. Well maybe not clocks as you might think, but digital computers have always had oscillators, and if you hook the oscillator to a simple counter then you have a clock. The clock is not just there to tell the time, although it can do that, nor is it there just to record the time when data files are created or modified, though it does that too. Knowing the time is important to many functions, and one of those is security. more

Cyber Scorecarding Services

Ample evidence exists to underline that shortcomings in a third-parties cybersecurity posture can have an extremely negative effect on the security integrity of the businesses they connect or partner with. Consequently, there's been a continuous and frustrated desire for a couple of decades for some kind of independent verification or scorecard mechanism that can help primary organizations validate and quantify the overall security posture of the businesses they must electronically engage with. more

FISMA Standards Could Have a Major Impact on the Private Sector

The public is taking an increasing interest in ensuring that IT assets of federal agencies are protected from cybersecurity attacks. FISMA is addressing this concern, in part, by initiating a standard setting process for continuous monitoring. The actions taken by NIST for the federal sector could have a very significant impact on the private sector because pending legislation would provide the federal government with the authority to mandate cybesecurity measures on the private sector. more

Defending the Network Several Times Over

Modern networks can be attacked in a variety of ways, meaning that companies need different types of protection. This article explains some of the risks involved, and provides some easy ways to deal with them. more

2023 Routing Security Summit Starts July 17 - Participate Virtually

Interested in learning more about routing security? How it can affect your connectivity supply chain? What are best practices for enterprises and organizations? What is the role of CSIRTs in securing routing? What are governments doing now, and planning to do in the future around routing security? more

Protection Is Only One Side of the Security Coin

"Security is all about protecting the user." That's the comment that came up the other week in the twittersphere that kicked off a not-unexpected trail of pro and con tweets. Being limited to 140 characters makes it rather difficult to have a deep and meaningful discussion on the topic and the micro-blogging apparatus isn't particularly conducive to the communicating the nuances of a more detailed thought. So I thought I'd address the topic here in blog format instead. more

Searching for Truth in DKIM: Part 5 of 5

Throughout this series of articles we've been talking about DKIM, and what a valid DKIM signature actually means. .. What this means for senders (of any type) is that with DKIM, you’re protected. On the internet, your domain name is a statement of your brand identity – so by signing messages with DKIM, you can finally, irrevocably tie those messages to your brand. more

A Brief Primer on Anti-Satellite Warfare Tactics

Satellites make it possible for governments to provide essential services, such as national defense, navigation, and weather forecasting. Private ventures use satellites to offer highly desired services that include video program distribution, telecommunications, and Internet access. The Russian launch of a satellite, with nuclear power and the likely ability to disable satellites, underscores how satellites are quite vulnerable to both natural and manmade ruin. more

Topics

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days