I think the new gTLD program will have many successes. It is a failure, however, when it comes to serving developing and less developed economies, especially the communities in those economies. Actually it failed in serving communities anywhere, but it really failed when it came to serving the peoples of the world outside WEOG (the UN designations for the developed Western European nations and Other Groups; others including AU, CA US, and NZ). more
Much of the discussion regarding mobile security revolves around the growing "pandemic" of mobile malware. It's not uncommon to see headlines reporting the discovery of large numbers of new malware samples. However, as Google recently pointed out, with quite a bit of data to support them, there's little discussion of real world impact of these discoveries. This raises a number of relevant questions. Is the average user likely to be infected? Where does this malware come from? These are questions that deserve analysis and thoughtful responses. more
Declan McCullagh reporting in CNET: "Twitter last year began to abbreviate all hyperlinks using its t.co domain name -- which had the side effect of introducing a central point of failure where none existed before. That failure happened last night [Sunday Oct 7] around 11:30 p.m. PT when t.co went offline, meaning millions of Twitter users received 'non-existent domain' errors when trying to follow links." more
As I type these words, I am perched on one of the benches in the main thoroughfare of the cavernous venue hosting Mobile World Congress (MWC). Above me is a video screen warning me of the perils of the infamous local pickpockets, so I know I'm definitely in Barcelona! In its current form, MWC has been the mainstay event of the telecoms business for a decade, and its roots go back to the late 1980s. The slogan of this year's event is "Mobile is Everything". I believe this phrase is a symptom of an industry suffering from dangerous strategic drift. Here's why. more
In the past 24 months, distributed denial of service (DDoS) attacks have changed profoundly. Gone are the days when attackers worked under the radar, when machines were infected by botnet code unknowingly and attacks were disguised leaving very little to trace the exact origin. ... The other game-changer: It's easier than ever to execute attacks. The tools are so widely available that anyone with basic skills and a high-speed connection can become a "hacktivist." more
DNSSEC promised to secure DNS with cryptographic proof, yet messy rollouts, outages, and hype backlash ruined its reputation. This piece argues that storytelling and emotions shape adoption as much as specs, and that automation enables a reset. more
As the expiry date of the current IANA Functions contract approaches (October 1st, 2016), some in the US Congress are challenging the validity of the proposal to transfer (or "transition") the ovesight role currently exercised by the US Administration, to a multistakeholder system equipped with checks and balances. A letter was sent to the President of the United States of America. Similar letters were sent to the Speaker and Leadership of the House of Representatives, as well as to the President pro tempore and Leadership of the Senate. more
The year 2025 will be a landmark year for digital diplomacy and global governance. It is the year of wrapping up the UN cybersecurity OEWG and the negotiations on cybercrime at the Ad Hoc group. It's the year UN member states will decide on the future of the World Summit of Information Society process and the Internet Governance Forum (IGF). more
The United States Senate Intelligence Committee Chair, Mark Warner, has called on several domain name registrars, including Namecheap, GoDaddy, and Cloudflare, to address the misuse of their services by Russian actors attempting to influence the 2024 U.S. presidential election. more
As a former FCC senior staff member, the Commission's increasing disengagement in international telecommunication technology forums over the past two decades has been dismaying. One of the adverse effects of this obliviousness-by-design approach has been felt by American consumers in the massive, exponentially increasing volume of spoofed calling numbers and CallerIDs on communications from outside the United States. more
The Secure 5G and Beyond Act of 2020 has been submitted by the U.S. Congress to the White House for signing into law. It has been sitting there for several days now, but there are obviously more important developments demanding attention than a law compelling the Executive Branch to develop a 5G security strategy within 180 days through public and Federal agency consultations that will be implemented by the NTIA. more
On Tuesday, 2020 U.S. presidential candidate John Delaney announced a plan to create a Department of Cybersecurity. more
At Verisign, we believe that continuous improvements to the safety and security of the global routing system are critical for the reliability of the internet. As such, we've recently embarked on a path to implement Resource Public Key Infrastructure (RPKI) within our technology ecosystem as a step toward building a more secure routing system. In this blog, we share our ongoing journey toward RPKI adoption and the lessons we've learned as an operator of critical internet infrastructure. more
Cisco has launched an intent-based networking solution designed to be intuitive and adapt; a new approach claimed to be one of the most significant breakthroughs in enterprise networking. more
The eccentricities of California-based ICANN, the allocator of domain names, know few bounds. Based on the best of legal advice, though perhaps not the best of PR advice, it's Board has announced the system for allocating priority in the processing of around 1000 weighty applications for new top-level domain names. It has described the system, with all seriousness, as Digital Archery. A description that just begs for comparison with the English folk hero, Robin Hood. more