/ Most Viewed

The Issue of Market-Initiated Competition in Telecoms

Many political discussions are taking place all over the world about how to best stimulate national or provincial telecommunications infrastructure investments against the background of current market dynamics. In this context the question often revolves around whether there is a market failure and, if so, does the government have a role to play here to address the matter, or can it be left for the market to sort out. more

Macro Observations Facing Email Infrastructure

Last month I attended the 36th annual M3AAWG conference in San Francisco, where esteemed members of the online messaging and anti-abuse community come together to make the Internet a safer and more secure environment. The sending community is highly influential especially among Email Service Providers (ESPs) and truly dominated the two-macro conversations that I participated in. These conversations have the industry in somewhat of a transition. more

Help Us Answer: What Will the Internet Look Like in 10 Years?

What will the Internet look like in the next seven to 10 years? How will things like marketplace consolidation, changes to regulation, increases in cybercrime or the widespread deployment of the Internet of Things impact the Internet, its users and society? At the Internet Society, we are always thinking about what's next for the Internet. And now we want your help! more

A Look at the Growth of the Internet Routing System

Geoff Huston, APNIC's Chief Scientist, is visiting the RIPE NCC this week to spend time with his fellow Regional Internet Registries (RIR) colleagues and to strengthen collaboration on shared projects. We've used this opportunity to invite him to produce the 'Interesting Graph of the Week'. Geoff has been monitoring the global routing system for many years. Here are his most recent observations. more

An Investigation Shows How Bomb Threat Scammers Hijacked Thousands of Big-Name Domains

Ars Technica's Dan Goodin reports that an "investigation shows the spam run worked by abusing a weakness at GoDaddy that allowed the scammers to hijack at least 78 domains belonging to Expedia, Mozilla, Yelp, and other legitimate people or organizations." more

A Lesson from the Environmental Protection Agency (EPA) in Domain Name Disputes

While the U.S. Environmental Protection Agency (EPA) has been making news as the result of controversial changes brought about under the new Trump administration -- including the planned removal of "several agency websites containing detailed climate data and scientific information" -- the EPA also has generated some (lesser-known) domain name news: The agency won a decision under the Uniform Domain Name Dispute Resolution Policy (UDRP) for the domain name noattacks.org. more

Afnic Reporting About Impact of New TLDs on Traditional TLDs

The October 2014 edition of the Afnic Industry Report on Domain Names is out with focus on the impact of the hundreds of new TLDs on "traditional" players. The October 2014 issue shows that gTLDs (.com, .biz., etc.) are impacted by the massive influx of new TLDs on the market whereas ccTLDs (.fr, .re, ...) are better resisting the newcomers. more

Now Is the Time to Act: The Technical Community Must Engage in Support of Multistakeholderism

Over the next two years, several global dialogues about our shared digital future are taking place -- and big changes could be in the cards. An intensive series of negotiations will see United Nations (UN) Member States weigh in on the future of digital cooperation -- and multistakeholderism finds itself under the spotlight. The multistakeholder model allows everyone who has a stake in the internet to meaningfully engage in discussions and decisions about its future on equal footing, but a number of critics are calling for change. more

Comcast Given 30 Days to Disclose Network Management Practices, Says FCC Order

In follow up to August 1st ruling against Comcast, Federal Communications Commission (FCC) in a 67 page order released today has given Comcast 30 days "to disclose the details of their unreasonable network management practices, submit a compliance plan describing how it intends to stop these unreasonable management practices by the end of the year, and disclose to both the Commission and the public the details of the network management practices that it intends to deploy following termination of its current practices." more

PIR, the Operator of .ORG Announces Jonathan Nevett as the New President and CEO

Public Interest Registry (PIR), the nonprofit operator of the .ORG domain has announced that its Board of Directors has unanimously selected Jonathon Nevett as President and Chief Executive Officer, effective December 17, 2018. more

FCC Gives Google, Sony and Others Full Authorization for Commercial Deployment of 3.5 GHz Spectrum

The U.S. Federal Communications Commission (FCC) on Monday announced it is allowing full commercial use of 3.5 GHz band for broadband connectivity and 5G. more

From Crisis to Resilience - the Path to Sustainable Communications Infrastructure in the Caribbean

The Caribbean suffered six major storms in 2017, including the record-breaking Category 5 hurricanes Irma and Maria. In the unprecedented destruction, the islands of Dominica and Barbuda lost all communication and telecommunications service, and eight other Caribbean countries were severely disrupted. Each hurricane season wreaks greater devastation than the last, yet decreased telecommunications competition, inadequate regulation, and high national debt burdens in the region yield ever-diminishing infrastructural investment. more

The Uses and Abuses of Cryptography

Another day, another data breach, and another round of calls for companies to encrypt their databases. Cryptography is a powerful tool, but in cases like this one it's not going to help. If your OS is secure, you don't need the crypto; if it's not, the crypto won't protect your data. In a case like the Anthem breach, the really sensitive databases are always in use. more

Essential Cyber Security Steps for Your Business

Layered security is a concept that's important for anyone who wants to create a strong, successful defense strategy to understand. This is a strategy that relies on the use of multiple lines of defense in an attempt to repel any potential attacks. For this reason, it's based on the principle that says "no single form of protection is enough to stop a determined cybercriminal. more

DNSSEC Root Signature, Almost There!

IT security specialists have known for years that the plain DNS is not to be trusted. Any hope for improvement rests on the DNSSEC protocol deployment. In this post, I will review the current status in one critical aspect, namely the DNS root signature key management. The other two foremost are the application usage of DNSSEC protocol functionality and the operational front, or the extent of deployment in the DNS infrastructure. The operational front includes the support by the DNS root nameservers, but my focus on signature key management leaves this issue aside. more