As an admin, app security should be a top priority - but SaaS apps represent a difficult challenge in that regard. How can you protect your business from their risks, while enjoying all their rewards? Within the average enterprise, there are 508 unique cloud applications in use. That number's overwhelming enough on its own without considering that 88% of those applications aren't enterprise ready, or the fact that one in five cloud applications has data sharing as a core functionality. more
Pawn Storm, also known as Sednit, Fancy Bear, APT28, Sofacy, and STRONTIUM, is a cyber espionage organization operating for over a decade which has been particularly aggressive in the past few years. more
According to a new report by the Danish government's Center for Cybersecurity, hackers have breached email accounts and servers at both the Defense Ministry and the Foreign Ministry in 2015 and 2016. more
Walden Savings Bank will be the fifth bank in New York state to switch its domain name from a .com top-level domain (TLD) to the new .bank TLD in May of this year. more
On April 20, 2017, an 8-person delegation led by Göran Marby, President & CEO of ICANN, visited China Academy of Information and Communication Technology (CAICT). Madam Liu Duo, President of CAICT met with Mr. Göran Marby and the delegation. After the meeting, Mr. Marby attended the Chinese Internet Community Seminar held jointly by CAICT and ICANN Beijing Engagement Center. more
A 32-year-old Russia man was sentenced on Friday to 27 years in prison for computer hacking crimes that is reported to have caused over $169 million in damages to small businesses and financial institutions. more
Classified ad site craigslist is famously protective of its contents. While they are happy for search engines like Google to index the listings, they really, really do not like third parties to scrape and republish their content in other forms. In 2013 craigslist sued a company called 3taps which had created an API for craigslist data. They also sued real estate site Padmapper, which showed craigslist and other apartment listings on a map, something craigslist didn't do at the time. more
California was recently reminded that rain can be very dangerous. In February, the nation's tallest dam, the Oroville dam in northern California, became so overloaded with rain that over a 100,000 people had to evacuate their homes. Many of them ended up at the fairgrounds, a common place for rural communities to gather in times of disaster. Many rural fairgrounds remain unconnected to broadband Internet services, which can make a dangerous situation worse. Especially during critical times, the public must be able to access resources and communicate with their loved ones through the Internet. more
The UK government has released the results of national cybersecurity survey revealing nearly seven in ten large companies in the country have identified a breach or attack in the past 12 months. more
In The Limits of Filtering, Evan Engstrom and Nick Feamster argue eloquently that the costs of a "takedown-staydown" system to defend against copyright infringement would be prohibitive for online service providers (OSPs) and therefore deprive OSPs of otherwise interested investors. I agree that Engstrom and Feamster raise some valid points, particularly including that content recognition technologies are not perfect... However, we must also remember that the current DMCA regime imposes significant costs... more
While the most common results of a UDRP proceeding are either transfer of a disputed domain name to a complainant or denial (that is, allowing the respondent to retain it), there is another possible outcome: cancellation. I'm always surprised to see a UDRP decision in which a domain name is cancelled. True, many trademark owners don't really want to obtain control of a disputed domain name (and, instead, they simply want to get it taken away from a cybersquatter). more
The Registration Operations Workshop (ROW) was conceived as an informal industry conference that would provide a forum for discussion of the technical aspects of registration operations in the domain name system. The 6th ROW will be held in Madrid, on Friday May 12th 2017 in the afternoon, immediately after the GDD Industry Summit and prior to ICANN DNS Symposium and OARC 26, using the same venue as all above-mentioned events. more
A team of Internet activists including co-founder and ex-spokesperson of the Pirate Bay, Peter Sunde, today announced the launch of a unique domain name service, called Njalla, designed to act as a "privacy shield" for registrants.
more
There are no gatekeepers to prevent registrants from acquiring domain names incorporating marks that potentially violate third-party rights. Anyone anywhere can acquire domain names composed of words and letters in languages not its own through a registrar whose registration agreement is in the language of the registrant. For example, a Chinese registrant of a domain name incorporating a Norwegian mark as in <statoil.store> in which Complainant requests the proceeding be in English notes that Chinese is not an official language in Norway. more
Do consumers still get confused when they see a URL without a .com (or other traditional extension)? Probably -- but I don't think anyone really knows the answer to that from a global perspective. What I do know, however, is that it's important for those of us in the new TLD industry to help our brand customers ensure that we're providing audiences with the best possible chance to identify new domains as legitimate web addresses. more