/ Most Viewed

Greater Caribbean Cooperation Needed to Combat Cyber Crimes

The Caribbean is under virtual siege as incidents of cyber attacks and cyber crimes surge across the region. "The sophisticated use of technology by highly incentivised criminal organisations has created unprecedented opportunities for transnational crime elements that no one region, country or entity can fight on its own. More inter-regional cooperation and collaboration are needed to develop and implement smart and integrated approaches to fight new and emerging cyber threats." more

The Operationalization of Norms and Principles on Cybersecurity

With two simultaneous processes getting underway in the UN General Assembly's First Committee, the UN Group of Governmental Experts (GGE) and the Open-Ended Working Group (OEWG) on Cybersecurity, and several technology and multi-stakeholder initiatives pushing cybersecurity improvement, the world of cyber norms has become both more interesting and more complicated. more

CAICT Holds ICANN 58 China Internet Community Readout Session

In the afternoon of March 29, the CAICT held the ICANN 58 China Internet Community Readout Session in the CAICT together with the ICANN Beijing Engagement Center. Mr.Li Xiangning, Deputy Director General of Information and Communication Administration under the Ministry of Industry and Information Technology (MIIT), attended the event and gave a speech on the meeting. Over 60 representatives from related governmental agencies including the Office of the Central Leading Group for Cyberspace Affairs, the Ministry of Foreign Affairs and Beijing Communications Administration, domain name registries and registrars, industrial organizations, institutes and universities participated in the seminar. more

Many .COM Domain Names with Same Keywords as Premium New gTLDs are Available for Registration

Earlier this month, Andrew Allemann wrote a post on notable NameJet sales in which he discusses the sale of PropertyRehab.com for $2,400 as "a perfect example of how wrong some domain registries are on their premium pricing." He mentions that the registry operator for the .rehab new generic top-level domain (new gTLD), has marked property.rehab as a platinum domain name and asks: "Why would someone pay thousands (or tens of thousands) a year for Property.rehab when they could buy PropertyRehab.com for just $2,400?" more

Are We Facing the Splinternet?

One of the consequences of the war between Russia and Ukraine is that Russia has largely stopped participating in many large worldwide web applications. Russia has blocked Facebook and Twitter. Other applications like Apple, Microsoft, TikTok, Netflix, and others have withdrawn from Russia. The European Union is in the process of trying to block Russian-generated content, such as the state-owned news outlets of RT (formerly Russia Today) and Sputnik. more

Kleinwaechters Treasure Map

Wolfgang Kleinwaechters Internet Governance Outlook on CircleID each year sums up the drama of internet governance as it is played out on the global stage. We assume that all players on the internet governance stage work under the premise that despite all our differences, ultimately, we are united in our quest for "freedom from fear and want" based on the quality and dignity of all human beings, as expressed in the Universal Declaration of Human Rights (UDHR). more

Ransomware Crime Bill Goes into Effect in the State of California

As of January 1, the delivery of ransomware is illegal in California as per Senate Bill 1137 going into effect. more

Spam: You’ve Come a Long Way, Baby

According to the majority of the testimony at this month's "Spam Summit," held by the U.S. Federal Trade Commission (FTC), the state of the fight against spam is pretty much the same as it has been for the last several years. The two days of presentations can largely be boiled down to the following bullets: Spam volumes continue to increase, being driven by the growth of "botnets"... Oh, and the spam wars are a lot less exciting than they used to be. Case in point: unlike last time, there were no fist-fights at this year's shindig. more

Defense Science Board Urges Obama to Take Immediate Cybersecurity Measures

According to a report by the Defense Science Board, the President-elect Barack Obama will inherit a cybersecurity infrastructure that is ill-prepared for advanced cyberattacks which will be of particular challenge for the new leaders... Reporting today on eWeek, Roy Mark writes: "The Bush administration has been widely criticized by security experts as de-emphasizing cyber-security and hamstringing the authority of officials in charge of government-wide cyber-security" said Roy Mark in a report eWeek." more

A Diversity Success Story from the Apps for Ag Hackathon Competition

Deema Tamimi had one plan for the 2016 California Apps for Ag hackathon: get in and get out. She thought the weekend-long event would be a good opportunity to meet people, but she didn't feel ready to launch a new app, and so she planned on stealing away soon after the hackathon began. This, despite the very impressive resume she'd accrued and the fully-formed idea for a gardening-based app that had been brimming for half a year. But something magical can happen when so many engineers, experts, change-makers, and creatives converge at a hackathon. more

Differing UDRP Decisions Show That Facts Matter

"Past performance does not necessarily predict future results." That's what the U.S. Securities and Exchange Commission requires mutual funds tell investors. But it's also true about domain name disputes. Cases in point: In four recent proceedings under the Uniform Domain Name Dispute Resolution Policy (UDRP), the operator of a large bank won two decisions but lost two others, despite a track record of having won more than 30 previous UDRP disputes. more

Entrenched Decision Makers Won’t Hold Back IaaS Adoption

In an interesting article on Information Week, Jonathan Feldman makes the argument that because of entrenched attitudes and established practices among "IT infrastructure gurus," Infrastructure as a Service (IaaS) will fail to gain traction, forcing developers to turn towards Platform as a service (PaaS) as the route of least resistance. Feldman is not anti-IaaS, he makes it clear that he thinks enterprise infrastructure managers are making a mistake, but believes they'll continue to make it anyway. more

Biden Administration Probes Chinese Telecom Firms Over U.S. Data Security Concerns

The Biden administration is investigating China Mobile, China Telecom, and China Unicom over concerns that these companies could potentially exploit their access to U.S. data through their cloud and internet services, potentially sharing this data with the Chinese government. more

How Should I Present .Brand Domains in Advertising? (Part 2)

Part 2: How do I choose the right option for my brand? In my previous article, I discussed the question of how to represent .brand domains in advertising. As you can imagine, it's a balancing act -- stimulating awareness of the domain, creating the desired customer behavior of the future using .brands, whilst ensuring that we are considerate to the fact that .brands are yet to hit mainstream awareness. Sounds simple right? more

Those Who Don’t Remember 2014 Are Doomed to Repeat It

J. Gordon Crovitz is making his case against the IANA transition again today, in the pages of the Wall Street Journal. I think it's useful to once again go on record opposing his flawed logic against the transition. i2Coalition was among those that publicly praised the IANA transition report when it arrived this week. When the Washington Post covered our announcement, I was frustrated by a commenter who has a different take on the transition than I. more