/ Most Viewed

The “Bottom Dilemma”

I attended the 46th ICANN meeting in Beijing, China, and made a statementat on the panel "Internet Governance -- The Global Agenda", questioning the limits of the multistakeholder model, or more precisely the "bottom" of the bottom-up concept. My expectation was enormous, just at the time when two important meetings on governance and information society are in evidence: the WCIT and WSIS +10. more

US Senate Judiciary Subcommittee Hearing Held on IANA Transition

"I urge you: Do not give a gift to Russia and other authoritarian nations by blocking this transition," Lawrence Strickling, administrator of the U.S. Commerce Department's National Telecommunications and Information Administration, said on Wednesday at a Senate Judiciary Subcommittee Hearing Held on IANA Transition. more

Measuring Digital Rights for the Attainment of Internet Universality

Measuring the information society in order to achieve development goals is a challenge and a necessity to ascertain progress made in terms of ICT sector development and socio-economic growth. Many intergovernmental, governments, non-profit and private organisations have sought to tackle the challenge through setting targets, defining indicators, and applying research methods to measure progress. Nevertheless, ambitious goals and targets relate mostly to the achievement of physical connectivity to ICT... more

National Association of Secretaries of State (NASS) Cautions ICANN on .INC, .LLC, .LLP, .CORP TLDs

Michael Berkens reporting in TheDomains.com blog reports: National Association of Secretaries of State (NASS) is an organization whose members include Secretaries of State and Lieutenant Governors of the 50 U.S. states and territories send a letter to ICANN in late July that was just published today, that the new gTLD's .INC, .LLC, .CORP and .LLP.should only be allowed to be registered by 'entities that are appropriately registered and in good-standing with the Secretary of State or other appropriate state agency." more

New CSC Report Emphasizes Need for Holistic Domain Security Amid Surge in Popularity for AI

It seems that every day, a new artificial intelligence (AI) capability emerges, posing exciting possibilities for technological advancements -- but also great potential to equal or greater risks. Cybercriminals have taken notice of this rapid surge in the popularity of AI technologies and are attempting to take advantage. more

Accountability Initiatives to Secure a Strong Future for .ORG

Last fall, when we put forth our bid to acquire the Public Interest Registry (PIR), our announcement - made jointly with PIR and its parent, the Internet Society - was met with questions. We took them seriously and made a conscious effort to engage with representative members of the .ORG community to deepen our understanding. We found that a consistent message was that the commitments made by Ethos since this fall addressed most of the community's issues, but there was a question as to whether they were enforceable and if so, how? more

GAO Rules IANA Transition Not a Transfer of Government Property Requiring Congressional Approval

The Untied States Government Accountability Office (GAO) has concluded that the IANA transition is not a government transfer of property requiring congressional approval. more

Trump to Sign Cybersecurity Executive Order on Tuesday

President Donald Trump expected to sign an executive order on cyber security on Tuesday. more

U.S. Now Leading Source of Attack Traffic, Followed by China and Russia

The U.S. became the top attack traffic source in the second quarter of 2010, accounting for 11% of observed attack traffic in total, reports Akamai in its State of the Internet Report released today. According to the report, China and Russia held the second and third place spots, accounting for just over 20% of observed attack traffic. Attack traffic from known mobile networks has been reported to be significantly more concentrated than overall observed attack traffic, with half of the observed mobile attacks coming from just three countries: Italy (25%), Brazil (18%) and Chile (7.5%). more

ICANN LAC-i Roadshow Stirs “High Interest” in Caribbean ccTLDs

The Caribbean can create a unique flavour on the Internet by using effectively managed and financially stable Country Code Top-Level Domains. Speaking after ICANN's first Caribbean edition of its Latin American and Caribbean Internet Roadshow (LAC-i Roadshow), recently held in Turks and Caicos Islands, Albert Daniels said the event yielded "very high interest" in the management and operations of the local ccTLD, .tc. Daniels is ICANN's senior manager of stakeholder engagement in the Caribbean. more

New gTLD Availability Inching Closer to Reality

As many in the ICANN community prepare to depart for the sunny beaches of Cancun, Mexico, it appears the ICANN 76 meeting could be significant when it comes to the long-awaited next application window for gTLDs. It's been over 11 years since applicants were last able to apply for a gTLD (and some of those strings are still launching into the marketplace all these years later), and the community work to review that initial process has never really stopped. more

Women in Security Organize New Conference in Reaction to RSA’s Lack of Female Speaker Inclusion

RSA, one of the largest cybersecurity conferences, has been criticized for booking only one female keynote speaker this year who is Monica Lewinsky. more

US Antitrust Enforcement in Telecommunication Being Ramped Up

The Wall Street Journal is reporting that antitrust enforcement in telecommunication is being ramped up by the Obama Administration, after relatively lax times. In a piece entitled Telecoms Face Antitrust Threat it indicates that investigators are weighing up the roles of the large carriers and whether they are abusing the market power amassed under the Bush Administration. more

Bug Bounty Programs: Are You Ready? (Part 3)

The Bug Bounty movement grew out a desire to recognize independent security researcher efforts in finding and disclosing bugs to the vendor. Over time the movement split into those that demanded to be compensated for the bugs they found and third-party organizations that sought to capitalize on intercepting knowledge of bugs before alerting the vulnerable vendor. Today, on a different front, new businesses have sprouted to manage bug bounties on behalf of a growing number of organizations new to the vulnerability disclosure space. more

China, Russia Posing More Aligned Cyberattack Threats to the US, Says Chief of National Intelligence

Dan Coats, Director of US National Intelligence warns China and Russia are increasingly using cyber operations to steal information, influence citizens and to disrupt critical infrastructure. more