/ Most Viewed

Registration Operations Workshop (ROW) at IETF-93: RDAP as a Successor of Whois

The next Registration Operations Workshop will take place at the start of IETF 93 on Sunday, July 19th, 2015. The focus of this workshop is on the Registration Data Access Protocol, the successor of Whois. RDAP is a combined protocol for IP addresses and names registration data. Therefore, we are expecting both domain names and RIR communities to attend the workshop. more

A Bigger Boat: Application Security Outgrows Capacity for CIOs

There is a classic scene in the movie, "Jaws," when Roy Scheider gets a look at the size of the shark circling his fishing vessel and says, "We're going to need a bigger boat." The same case can be made for CIOs dealing today with application security. Hackers from all over the world are circling business and government like great whites looking for vulnerabilities in Internet-facing applications. The growth of applications is great for doing business but they have become chum in the water for predators. more

Domain Name Registry and Registrar Separation Now Probably Going to Be a Policy Debate

Again on the subject of new Top-Level Domains (TLDs) ... One of the "issues" that concerned a number of people is the concept of "vertical separation". The basic idea is that domain name registries and registrars should be kept separate. While that is a wonderful Utopian ideal, the reality is that in the real world companies own other companies, people trade in stocks and shares etc., etc. So it's far from being a simple "cut and dried" situation. more

Spammers’ Aid Program

A couple of months ago, Microsoft Sweden launched a program called Spammers' Aid. This is a program (created and provided by Microsoft?) that is designed to help spammers reform their ways. The idea is that since spam is continually decreasing in email and spammers are finding it more and more difficult to get their mail delivered into the inbox, why not use the skills they acquired while spamming (sales and marketing, tech skills) and apply it for good? This program teaches them how. more

2012: The Year of Securing Websites?

In a seemingly never-ending row of news on hacks of websites now the news in which 2.3 million individual cases of privacy sensitive data were accessible through a leak in the websites of most public broadcasting stations in the Netherlands. To make the news more cheerful, the accessible data was, if compiled, sufficient to successfully steal a complete identity. What were thoughts that came to my mind after hearing this news on Friday? more

Nominations Open for 2022 Public Interest Registry (PIR) Board of Directors

Are you interested in helping guide the future of the Public Interest Registry (PIR), the non-profit operator of the .ORG, .NGO and .ONG domains? Or do you know of someone who would be a good candidate? If so, the Internet Society is seeking nominations for three positions on the PIR Board of Directors. Read more for details if you are interested in being considered as a candidate or know of someone who should be considered. more

House Committees Taking Aim at IANA Transition Proposal

In an unanticipated move a third Committee of the US House of Representatives has weighed in with concerns regarding the NTIA's proposed transition of the US role as counterparty to ICANN's IANA functions contract to one with the "global multistakeholder community". On May 13th the House Armed Services Committee Report for HR 4435, the Defense Authorization bill, was released. more

CENTR Reports TLD Slowdown Partly Due to Deletes by Chinese Investors Which Had Peaked in 2016

The Council of European National Top-Level Domains Registries (CENTR) in its quarterly report released today, says global domains under all TLDs have contracted slightly due to declines in several larger new gTLDs. more

We’re Almost There… IANA Stewardship Transition

Since Friday, I have been listening to and, yes, talking to many in Dublin who are engaged in the multistakeholder effort to transition the IANA functions. Our goal is an orderly transition that both reaffirms the strength of the global multistakeholder model while protecting and preserving the coordinated, well-functioning administration of the unique identifiers that are the core of the technical genius of the Internet. more

Montana Becomes First State to Require ISPs to Abide by Net Neutrality Principles Despite FCC Repeal

Montana Governor Steve Bullock signs an executive order requiring ISPs with state contracts to adhere to internet neutrality principles. more

Taking the Anti-SOPA Message to the People

It was fascinating last week to read coverage of congressional hearings around the SOPA bill, or Stop Online Privacy Act. The bill has strong support from the Motion Picture Association of America, the U.S. Chamber of Commerce and big pharmaceutical companies. It's opposed by most technology and telecom companies, plus consumer advocate groups like the Electronic Frontier Foundation and Public Knowledge. more

FCC Commissioner O’Rielly’s Appalling Op-Ed on the ITU

The FCC Commissioner Michael O'Reilly's recently contributed opinion on the ITU in "The Hill" is beyond bizarre. It also sadly displays an appalling lack of knowledge of the organization and its history. I find it disturbing - as someone who held senior positions at both the FCC and the ITU and wrote the organization's history - how fundamentally ignorant an FCC Commissioner could be today of the global telecommunications ecosystem. more

ICANN 53: Accountability, Brand Policy & New Round of New gTLDs

In June, MarkMonitor joined our colleagues once again at the Internet Corporation of Assigned Names and Numbers (ICANN) 53rd public meeting in Buenos Aires, Argentina. Several high-profile and contentious issues were on the agenda, many of which have significant impact on the interests of intellectual property and brand owners. Among these are the ongoing ICANN Accountability issues and the impending departure of ICANN CEO Fadi ChehadĂ©; registrant information (Whois) transparency, accuracy and accessibility; and the timing of the next round of new gTLD applications/delegation. more

Identify DDoS Attacks with Monitoring of Internal Applications (Part 1 of 3)

Most cloud DDoS mitigation services are offered on demand meaning that customers can enable the service when they are the victim of a DDoS attack. But how can a company find out -- quickly -- that it is under attack? Sometimes it is difficult to know. In this three part series, we will examine multiple monitoring tools companies can use to capture DDoS, which can help determine whether you are under a DDoS attack. more

The Root of the DNS

Few parts of the Domain Name System are filled with such levels of mythology as its root server system. Here I'd like to try and explain what it is all about and ask the question whether the system we have is still adequate, or if it's time to think about some further changes. The namespace of the DNS is a hierarchically structured label space. Each label can have an arbitrary number of immediately descendant labels, and only one immediate parent label. more