Featured Blogs

Latest

Trademark Rights Paramount to Contract Rights for Domain Names

UDRP decisions come down from providers (principally from WIPO and the Forum) at the rate of 7 to 10 a day. Complainants mostly prevail; this is because in 90% of the cases (more or less that percentage) respondents have no plausible defense and generally don't bother appearing, although default alone is not conclusive of cybersquatting; there must be evidence of infringement. When complainants do not prevail, it is not because they lack rights... more

Will October Be Our Biggest Month Yet for .brand TLDs?

I'll admit I tend to get evangelical when I'm talking about .brands. To me and the team at Neustar, every development in this space is exciting and significant and we're always eager to share the latest news and insights. But you don't have to be a .brands nut to see that the last few weeks have shown some serious signs of momentum. And it makes me wonder, with everything that's developed in just the last week or two, could we be set for October to be the biggest month in .brands we've ever seen? more

“Keep Those Eyebrows Up!” - Cybersecurity at the Global Women’s Forum

News of cyberattacks is slowly becoming a new normal. We are still at a stage where high-profile cases, like the recent attack against the American credit reporting company Equifax, in which 145.5 million users had their personal information compromised, raise eyebrows. But we need those eyebrows to stay up because we should never accept cyber threats as the new normal. more

Software Has Already Eaten Telecoms (It Just Has Indigestion)

The unconscious and near-universal belief is that packet networks are a telecoms service, and one that constructs an 'additive' resource called 'bandwidth'. This is demonstrably technically false. They deliver distributed computing services, as they calculate how to divide up an underlying telecoms transmission resource. The ubiquitous error is a failure to recognise that the hardware platform has already been devoured by the software industry. more

‘Beyond the Scope’ of the UDRP

Not all domain name disputes are appropriate for resolution under the Uniform Domain Name Dispute Resolution Policy (UDRP). While the UDRP is clearly the "go-to" legal tool for trademark owners pursuing cybersquatters, some disputes are about larger -- or different -- issues than the UDRP was designed to address. As stated in WIPO's Overview: Depending on the facts and circumstances of a particular case, and irrespective of whether the parties may also be engaged in court litigation... more

General Data Protection Regulation and the Future of WHOIS

Why does all of the discussion around potential options for WHOIS in the era of the EU's GDPR (General Data Protection Regulation) feel like déjà vu? Is it because issues around WHOIS never really go away, and become a hot topic every few years? Is it because no one is really happy with the current system? Privacy advocates would be delighted to do away with it altogether, while business and Intellectual Property professionals press for improvements to accuracy and availability, which I fully support. more

Domain Marketing for Powerful Branding

46 percent of U.S. small businesses still don't have a website for their company. Without a website, these businesses are missing the most critical piece to their overall success and are causing users to be unable to easily find their products, services and offerings. Domain names are the foundation of a business's digital identity. Relying on nothing more than a Facebook page or an Instagram account makes companies too dependent on a single outlet and reliant on the popularity of a specific platform. more

An Overview of the 27th DNS Operations, Analysis, and Research Center Meetings

The DNS Operations, Analysis, and Research Center (DNS-OARC) meetings are an instance of a meeting that concentrates on the single topic of the DNS, and in this case, it delves as deep as anyone is prepared to go! It's two days where too much DNS is barely enough! The hot topic of the meeting was the news that the proposed roll of the Key-Signing-Key of the root zone of the DNS, originally scheduled for October 11, was to be postponed. more

I Never Signed Up for This! Privacy Implications of Email Tracking

What happens when you open an email and allow it to display embedded images and pixels? You may expect the sender to learn that you've read the email, and which device you used to read it. But in a new paper we find that privacy risks of email tracking extend far beyond senders knowing when emails are viewed. Opening an email can trigger requests to tens of third parties, and many of these requests contain your email address. more

Why Bitcoin Will Not Solve the Caribbean’s Financial Inclusion Woes

There's a deluge of hype around Bitcoin and blockchain technologies right now, and policymakers and regulators in the Caribbean are doing their best to wrap their heads around the advantages and disadvantages of this virtual currency. Similar questions are being contemplated in the ICTs for development (ICT4D) community, taking into account that electronic money (e-money) platforms such as Safaricom's M-PESA have essentially solved the financial inclusion quandary for millions of people in Kenya. more

Why I Want a .PAYPAL New gTLD

I use Paypal, and I am quite satisfied with how it helps me with my business: it is still a little hard to use, and I don't use all functions of the tool, but it is not so expensive, it is fast and efficient, and Paypal does not send so many emails. In one word, Paypal rocks... The only problem that I have with Paypal is the number of fake emails that I receive. Of course, I easily identify them as they come in and luckily, G Suite (Gmail) does an excellent job at blocking all spam and phishing. more

Amazon Web Services Targets Startups and Creators With .aws

It will come as no surprise to those who've read my blogs that I get pretty excited about seeing .brand domains launch. At Neustar we're all in on promoting .brand usage in any industry, from all around the world and as such, we're always watching closely for any signs of new domains on the horizon, trawling for case studies or any hint of new activity. So imagine my surprise when a brilliant .brand example jumped out in front of me at JFK airport. more

A Closer Look at Postponing of the Root Zone KSK Rollover Decision

On Sept. 27, Internet Corporation for Assigned Names and Numbers (ICANN) announced that the first root zone Key Signing Key (KSK) rollover - originally scheduled to take place on Oct. 11 - will be postponed. Although this was certainly a difficult decision, we fully agree that erring on the side of caution is the best approach to take. In this blog post, I want to explain some of the involvement Verisign has had in KSK rollover preparations, as well as some of the recently available research opportunities which generated data that we shared with ICANN related to this decision. more

A European Perspective on the Equifax Hack: Encouraging Data Security Through Regulation

The Equifax hack is understood to have compromised the personal data of over 140 million individuals. Although recent hacks of other businesses have affected more individuals, the personal data held by Equifax is significantly more sensitive than the data compromised in other hacks and includes Social Security numbers, birth dates, current and previous addresses and driver licence details... (Co-authored by Peter Davis and Brendan Nixon.) more

Why Homegrown Subscriber ID Solutions Limit Problem Solving

Most service providers are aware that there needs to be a simple, fast way to identify subscribers. Unfortunately, in reality, mapping IP addresses back to subscribers for identification purposes - such as lawful interception requests or acceptable use policy violations - can be complicated. It usually involves analyzing data sets, completing manual audits, or reliance on multi-step solutions. more

Topics

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days