Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Finding the Holes in Your Application Security Blanket

Last month, application security provider Veracode came out with a study that stated that more than half of all enterprise applications aren't secure. The company tested approximately 2,900 applications over an 18-month period, and 57 percent failed to meet Veracode's "acceptable levels" of security. While this study gained a tremendous amount of traction in the media... it does not focus on the bigger issue... more

The US-China Cold War in Cyberspace

In 2019 and 2020, the economic conflict between the US and China reached a peak. There was a months-long tariff battle that is still not fully resolved. After blocking Chinese-centered equipment manufacturer Huawei from its own markets, the US pushed hard to get the Five Eyes and all of its allies to block Huawei from foreign markets, too. Then the US started blocking its own companies... more

A Chance to Tackle the Urban Digital Divide

For the first time in my career, we face the possibility of some big changes for broadband in low-income neighborhoods in cities. The recent American Rescue Plan Act (ARPA) gave cities significant funding that can be used for various kinds of infrastructure, including broadband. Cities have been handed a once-in-a-lifetime chance to fix some of the broadband deserts that have grown in poor neighborhoods. I'm already working with several cities that are taking this opportunity seriously. more

9th Registration Operations Workshop (ROW), June 16th, 2020, Online

The Registration Operations Workshop (ROW) was conceived as an informal industry conference that would provide a forum for discussion of the technical aspects of registration operations in the domain name system and IP addressing. The 9th ROW will be held online on Tuesday, June 16th, 2020 at 13h00-16h00 UTC. more

Domain Name Variants Still Won’t Work

ICANN has spent years trying to figure out what to do with domain name variants, strings that look different but mean the same thing, for some definition of "the same." They've been trying to deal with them in second level domains for a decade, and are now working on rules to allow variant top-level domains. Unfortunately, variants don't work. The problem isn't putting them in the DNS; it's that once they're in the DNS, they don't work anywhere else. more

Broadband Tariffs: The Significant Gap Between Residential and Business

Analysis from Point Topic's recent reports on global broadband tariffs has revealed a significant gap in residential and business tariffs worldwide. Clearly businesses are paying more for their services than residential consumers but the relative differences in the ratios is more marked than might be expected. The first thought is that they are paying for more bandwidth and that is true to an extent. more

Nominations Open for 2024 Public Interest Registry (PIR) Board of Directors

Are you interested in helping guide the future of the Public Interest Registry (PIR), the non-profit operator of the .ORG, .NGO and .ONG domains? (and more) Or do you know of someone who would be a good candidate? If so, the Internet Society is seeking nominations for two positions on the PIR Board of Directors. The nomination deadline is 31 January 2024. more

If Demand Is Growing, Why Is Networking World Such a Depressing Place Right Now? Let’s Dig Deeper…

Over at the ECI blog, Jonathan Homa has a nice article about the importance of network planning: In the classic movie, The Graduate (1967), the protagonist is advised on career choices, "In one word – plastics." If you were asked by a young person today, graduating with an engineering or similar degree about a career choice in telecommunications, would you think of responding, "network planning"? Well, probably not... more

Food for Thought on the “New TLD” Business Models

There is always some degree of confusion in discussions about the "new TLDs". Some points of view try to be optimistic, others on the contrary only highlight the bad news, and most refer indistinctly to the "new TLDs" as if they did not break down into different segments, each of which obeys dynamics and constraints of its own. The purpose of this post is to provide some food for thought and to shed some light on those dynamics and constraints... more

More Privacy, Bit by Bit

Before the Holidays, Yahoo got a flurry of good press for the announcement that it would (as the LA Times puts it) "purge user data after 90 days." My eagle-eyed friend Julian Sanchez noticed that the "purge" was less complete than privacy advocates might have hoped. more

We Are Protecting the Internet, Not Giving It to the United Nations

Like many foreigners, I follow U.S. politics closely. What happens in Washington, D.C. on trade, economics, foreign policy, and security matters can often have ripple effects across the world. This is also true with respect to internet policy, and like many who work in the internet industry, I am getting increasingly concerned by some of the news coming out of Washington. more

Open Access for Apartment Buildings

San Francisco recently passed an interesting ordinance that requires that landlords of apartments and multi-tenant business buildings allow access to multiple ISPs to bring broadband. This ordinance raises all sorts of regulatory and legal questions. At the most recent FCC monthly meeting, the FCC jumped into the fray and voted on language that is intended to kill or weaken the ordinance. more

Reaching Google via Asia?

Across the Internet, yesterday, Google users twittered, blogged and emailed that Google search and mail were not usable. And, yesterday afternoon, on Google’s official blog, Urs Hoelzle reported that Google “direct[ed] some […] web traffic through Asia”... Even though Google is very well-connected to a diverse set of other networks, two of these relationships predominate. It is through these relationships that much of the Internet reaches Google... more

The Domain Name System: A Cryptographer’s Perspective

As one of the earliest protocols in the internet, the DNS emerged in an era in which today's global network was still an experiment. Security was not a primary consideration then, and the design of the DNS, like other parts of the internet of the day, did not have cryptography built in. Today, cryptography is part of almost every protocol, including the DNS. And from a cryptographer's perspective, as I described in my talk at last year's International Cryptographic Module Conference (ICMC20), there's so much more to the story than just encryption. more

What is Bring Your Own IP (BYOIP)?

An IPv4 address identifies your connection to the online world. IP addresses make it possible to host websites, manage secure communication, and engage in countless other essential, internet-related activities. Typically, when migrating to a new cloud provider, a business has only one path: lease the provider's IP addresses. But what if a business already has a block of IP addresses? more

Topics

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days