/ Featured Blogs

Verisign Mitigates 300 Gbps DDoS Attack and Other Q2 2014 DDoS Trends

It has been another busy quarter for the team that works on our DDoS Protection Services here at Verisign. As detailed in the recent release of our Q2 2014 DDoS Trends Report, from April to June of this year, we not only saw a jump in frequency and size of attacks against our customers, we witnessed the largest DDoS attack we've ever observed and mitigated -- an attack over 300 Gbps against one of our Media and Entertainment customers. more

What is Metadata, and Why Should I Care?

August 2014 is proving yet again to be an amusing month in the Australian political scene, and in this case the source of the amusement was watching a number of Australian politicians fumble around the topic of digital surveillance and proposed legislation relating to data retention measures. The politicians assured us that the proposed data retention measures were nothing untoward, and all that was being called for was the retention of "metadata" by Australian ISPs for a period of two years. more

Constituencies Coalesce on IANA Transition and Enhanced ICANN Accountability Principles

It is now being broadly acknowledged that, as expressed unanimously by all GNSO constituencies at the recent ICANN London meeting, "as part of the IANA transition, the multi-stakeholder community has the opportunity and responsibility to propose meaningful accountability structures that go beyond just the IANA-specific accountability issues". In a July 22nd Keynote Address at the American Enterprise Institute, NTIA head Lawrence Strickling - whose agency must approve any IANA transition plan developed by Internet stakeholders - made this linkage an explicit element of U.S. government policy... more

Video Interviews of IANA Stewardship Transition Coordination Group (ICG) Members

Want to know more about what is going on with the IANA Stewardship Transition Coordination Group (ICG)? ICANN recently published a set of video interviews with members of the ICG. Here, for instance is the interview with Alissa Cooper who represents the IETF on the ICG... While this is certainly not the complete list of ICG members, it is a good sampling of the variety of people involved with the ICG and does provide a range of different viewpoints into what is going on within the ICG process. more

Call for Nominations: M3AAWG J. D. Falk Award Seeks Stewards of a Better Online World

Anyone seeking to honor a groundbreaking contribution toward a better online world should submit a nomination for the 2014 M3AAWG J. D. Falk Award. Presented to people whose work on specific projects made the Internet a safer, more collaborative, more inclusive place, the J. D. Falk Award has recognized leaders and pioneers who saw elements of the online experience that needed improvement and took action to fix them.  more

Gmail Now Supports Internationalized Domain Names

If your first language isn't English and you don't use the Latin character set you can and will run into barriers. While Internationalized Domain Names (IDNs) i.e. domain names where either the left of the dot, the right of the dot or the entire string is in characters other than Latin ones, do exist and have existed for a number of years not all services work well with them. more

Six Approaches to Creating an Enterprise Cyber Intelligence Program

As few as seven years ago, cyber-threat intelligence was the purview of a small handful of practitioners, limited mostly to only the best-resourced organizations - primarily financial institutions that faced large financial losses due to cyber crime - and defense and intelligence agencies involved in computer network operations. Fast forward to today, and just about every business, large and small, is dependent on the Internet in some way for day-to-day operations, making cyber intelligence a critical component of a successful business plan. more

Is ICANN’s .IR Response at Odds with the ACPA and ICE Domain Seizures?

An initial review of ICANN's response to litigation seeking it to turn over control of the ccTLDs of Iran, Syria and North Korea led to the conclusion that it had opened a "legal can of worms". A few more just wriggled out, and they threaten the basic assumption that underlies the U.S. statute governing cybersquatting and the practices engaged in by Federal officials seizing domain names engaged in intellectual property infringement. more

From Telegraph (1914) to Twitter (2014) - Are There Lessons to Be Learned?

Could the Great War have been avoided if leaders had gotten together and negotiated in person instead of exchanging telegrams? In the voluminous historiography of the origins of WWI, there is a very little on the role of the telegraph. Today, as Twitter takes its place conference rooms, we can learn a lot from the failure of telegraph diplomacy one century ago... The telegraph introduced the notion of 'virtual presence'; for the first time in human history, communication was detached from transportation. more

Anti-Spoofing, BCP 38, and the Tragedy of the Commons

In the seminal 1968 paper "The Tragedy of the Commons" , Garrett Hardin introduced the world to an idea which eventually grew into a household phrase. In this blog article I will explore whether Hardin's tragedy applies to anti-spoofing and Distributed Denial of Service (DDoS) attacks in the Internet, or not... Hardin was a biologist and ecologist by trade, so he explains "The Tragedy of the Commons" using a field, cattle and herdsmen. more