Featured Blogs

Latest

Google Finds Nothing is Shovel Ready, Not Even for Free Fiber Build

Google is deploying fiber at its own expense in Kansas City, Kansas and Kansas City, Missouri to demonstrate the value of one gigabit (a gigabit is a billion bits -- a lot) per second residential Internet connections and perhaps to show at&t and Verizon and the cable companies how the search giant might fight back if its growth is restricted by their restrictions or limitations. ... Whoops. Google just learned the same lesson that President Obama learned in Stimulus 1 more

Neustar Professional Services: Additional Expertise to Improve Productivity

While it would be nice if your company had IT staff members that were experts in every technology, that is just not realistic. And today, many companies face the challenge of finding the appropriate and specialized expertise that is required to deal with ongoing issues such as network optimization, performance degradations, network risks, and more. more

Munich’s New Domains Conference Reveals Urgency to Act Now

Whoever said there wasn't enough room in Munich this time of year for anything but the mighty Oktoberfest clearly underestimated the draw of the new Top-Level Domain Program and the interest within Europe. The NewDomains.org conference held in Munich over the past two days confirmed three important insights for me; one: there is a large audience of brands and entrepreneurs who still have little awareness about the new Top-Level Domain program; two: those that are aware of the program and would like to participate are seriously behind schedule in preparing their application and strategy to submit to ICANN during the application window from 12 January to 12 April 2012. more

What Is Email Appending and Why Is It Bad?

MAAWG recently released a document on email appending, criticizing the practice and describing it as abusive. But what is email appending? ... This definition is alright but I didn't find it as helpful as it could be. I looked it up on some other sites and I have a better description. more

A Look at the Growth of the Internet Routing System

Geoff Huston, APNIC's Chief Scientist, is visiting the RIPE NCC this week to spend time with his fellow Regional Internet Registries (RIR) colleagues and to strengthen collaboration on shared projects. We've used this opportunity to invite him to produce the 'Interesting Graph of the Week'. Geoff has been monitoring the global routing system for many years. Here are his most recent observations. more

Multi-Stakeholder Debate at the IGF: Lessons from a Safari

Here at the IGF in Kenya, we're debating how governments, private sector, and civil society can improve the multi-stakeholder model that's helped the Internet become such a vital part of life around the world. Makes me think of another kind of multi-stakeholder model I saw last week on a photo safari in Kenya's Masai Mara National Reserve. more

Censorship, Email and Politics

Spamfiltering blocks email. This is something we all know and understand. For most people, that is everyone who doesn't manage an email server or work in the delivery field or create spamfilters, filtering is a totally unseen process. The only time the average person notices filters is when they break. The breakage could be blocking mail they shouldn't, or not blocking mail they should. more

The Human Factor in DDoS Attacks

Ripped from the headlines: A recent DDoS attack lasted an entire 60 days. In other news, a single site was attacked 218 times in Q2 alone. To those of us in the business of protecting Web infrastructure, these stories are hardly surprising. What's notable, though, is where they were reported, in The Financial, whose focus is banking and financial services, not technology. The reporters used the term "DDoS" as if it were as common as "hedge fund," something everyday business people, not just techies, grasp. It's this human element that caught my interest and got me thinking a little. more

On the Success of Malware

There's often a lot of discussion about whether a piece of malware is advanced or not. To a large extent these discussions can be categorized as academic nitpicking because, at the end of the day, the malware's sophistication only needs to be at the level for which it is required to perform -- no more, no less. Perhaps the "advanced" malware label should more precisely be reattributed as "feature rich" instead. more

Recent Industry Changes: Internet Standards, ARIN WHOIS Changes, Hotmail Postmaster Pages

Signing Email is now a Draft Standard! Signing email transitioned from a proposed standard to a draft standard (RFC6376 -- one of the new RFCs) over at the IETF a few days ago. The other is RFC6377. Let's go through a brief history of DKIM RFCs to refresh our memories... more

Cloud Is the New Mainframe

Cloud computing, from a business and management perspective, has a great deal in common with mainframe computing. Mainframes are powerful, expensive and centralized pieces of computing equipment. This is in line with their role as infrastructure for mission-critical applications. For these types of applications, mainframes can be fairly efficient, even though they tend to need large teams of support specialists... Cloud computing is a new style of computing... more

Typosquatting Continues to Pose Dangers to Enterprises, Consumers

While typosquatting is not a new phenomenon, recent research highlights that it is being used to collect sensitive corporate information from employees and lure consumers to interact with dubious websites. ... Security consultancy Godai Group recently uncovered the use of a specific type of typosquat - a "doppelganger domain" - to collect sensitive enterprise information via email-based attacks. more

Russia and China Propose UN General Assembly Resolution on “Information Security”

On September 12 China, the Russian Federation, Tajikistan and Uzbekistan released a Resolution for the UN General Assembly entitled "International code of conduct for information security." The resolution proposes a voluntary 12 point code of conduct based on "the need to prevent the potential use of information and communication technologies for purposes that are inconsistent with the objectives of maintaining international stability and security and may adversely affect the integrity of the infrastructure within States..." more

The US DOJ Rogue Internet Pharmacy Settlement: Implications for Registrars

In the wake of Google's settlement with the Department of Justice for permitting advertising by illegal online pharmacies, what are the legal implications for Domain Name Registrars and ISPs in the US and elsewhere? In short, if you're a Registrar or ISP, it's a new ballgame. Here's why it's critical for you to steer clear of criminal and civil liability by making sure your registration services aren't used by rogue online pharmacy criminals. (And, here's how to do it.) more

The Association of National Advertisers Blinders on New TLDs

I read with interest the piece by the Chairman of the Association of National Advertisers (ANA), Garry Elliot, in Advertising Age, which was partly prompted by my commentary in the same publication describing why new generic Top-Level Domains (gTLDs) could be an opportunity for some brands. He says: "From all I've seen, no matter how one tries to justify ICANN's process or the benefits it speculates will occur, it is simply impossible to defend the economics of the ICANN proposal. That is the Achilles' heel of this entire exercise. To paraphrase an old saying, 'It's the economics, stupid.'" more

Topics

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days