/ Most Viewed

Use of DNS Firewalls Could Have Prevented More Than $10B in Data Breach Losses Over the Past 5 Years

New research from the Global Cyber Alliance (GCA) released on Wednesday reports that the use of freely available DNS firewalls could prevent 33% of cybersecurity data breaches from occurring. more

Cheers! Registries and Registrars Doing the Right Thing by Patients

Domain name registration is a hot industry. Registrars represent a growing multi-billion dollar industry with the keys to the Internet for any organization hoping to have a web presence. Further, because of their role as one of the gatekeepers to the Internet, registrars have the unique ability and are often asked to take action against illegal activity online. This fact was highlighted in the report released this week by the Office of the U.S. Trade Representative, the 2015 Out-of-Cycle Notorious Markets List. more

An Insider’s Guide to the IPv4 Market - Updated

On September 24, 2015, the free supply of IPv4 numbers in North America dwindled to zero. Despite fears to the contrary, IPv4 network operators have been able to support and extend their IP networks by purchasing the IPv4 address space they need from organizations with excess unused supply through the IPv4 market. The IPv4 market has proved to be an effective means of redistributing previously allocated IPv4 numbers, and could provide enough IPv4 addresses to facilitate the Internet's growth for several more years while the protracted migration to IPv6 is underway. more

An Amazing Number - China Now Has 564 Million Internet Users: 75% Are Mobile

One of the staggering numbers introduced during the opening remarks at ICANN 46 here in Beijing by multiple speakers, including ICANN CEO Fadi Chehade and speakers from the Chinese government, was this: China now has over 564 million Internet users! Think about that for a minute. more

Spamtraps Are Overblown… by Senders

One of the fascinating parts of my job is seeing how different groups in email have radically disparate points of view. A current example is how much value senders put on spamtraps compared to ISPs and filtering companies. I understand why this is. In all too many cases, when a sender asks why they're mail is going to bulk or being blocked, the answer is "you're hitting spamtraps." The thing is, spamtraps are almost never the only reason mail is being blocked. more

U.S. Department of Energy Unveils Blueprint for the Quantum Internet

In a press conference on Thursday at the University of Chicago, the U.S. Department of Energy (DOE) unveiled a report that lays out a blueprint strategy for the development of a national quantum internet. more

Operational Challenges When Implementing DNSSEC

As a reader of this article, you are probably familiar with the DNS cache poisoning techniques discovered a few years ago. And you have most likely heard that DNSSEC is the long term cure. But you might not know exactly what challenges are involved with DNSSEC and what experience the early adopters have gathered and documented. Perhaps you waited with our own rollout until you could gather more documentation over the operational experience when rolling out DNSSEC. This article summarizes authors' experiences and learnings from implementing the technology in production environments as well as discusses associated operational issues. more

Bringing a New Top-Level Domain to Life

One of the key elements in any domain space is usage. It doesn't matter how potentially "cool" or "interesting" a Top-Level Domain (TLD) is if nobody is actually using it to provide content. It may be overused and totally abused, but "content is king"! The guys in dotMobi posted yesterday about some of the more interesting domains that they had come across recently. What did that lead to? Well I actually got out my phone and browsed the sites to see what all the fuss was about and I was truly impressed. more

The Story of Conficker and the Industry Response

On November 2, 2009, Microsoft released its seventh edition of the Security and Intelligence Report (SIR). The SIR provides an in-depth perspective on the changing threat landscape including software vulnerability disclosures and exploits, malicious software (malware), and potentially unwanted software. Using data derived from hundreds of millions of Windows computers, and some of the busiest online services on the Internet, this report also provides a detailed analysis of the threat landscape and the changing face of threats and countermeasures and includes updated data on privacy and breach notifications. The following is an excerpt from the SIR, pp 29-32, about the Conficker worm and the industry response that showed an incredible amount of collaboration across vendors. more

IPv6 and Formula One Racing

The Telecom World converged in greater numbers than ever before on Barcelona last week for the annual Mobile World Congress (MWC). This years' motto: Redefining Mobile. To see one of the worlds' leading automotive industry executives, Ford Motor's Bill Ford Jr. delivering a keynote was yet another illustration of the growing osmosis between Telecommunications and other industry verticals. more

Court Says gTLDs Aren’t ‘Domain Names’ for Cybersquatting Purposes, Declines LRO Review of .delmonte

A Swiss Del Monte entity that had a license to use the "DEL MONTE" mark applies to operate the .delmonte generic top level domain (gTLD). Another Del Monte entity, based in Delaware, filed a "legal rights objection" (LRO) - under WIPO-established procedures - to the Swiss Del Monte's application. A three member panel sustained the Delaware company's LRO... The Swiss entity sued in federal court seeking a declaration that it had sufficient rights in the "DEL MONTE" mark to operate the TLD... more

4 Key Dates on the gTLD Timeline

The new "dot-anything" domain extensions or "gTLDs" have been a major point of debate in the domain community for years now -- ever since they were just a glimmer in ICANN's eye -- and it's all come down to a few very important dates over the next six to nine months. more

Dot Brands Should Not Rush to Market, but Build Effective Strategies First

Brands applied for their new gTLDs to protect their brand and ensure they didn't miss an important new opportunity, but few had a clear business case for how they would use the gTLD platform when they applied. As brands approach the July 29th contracting deadline, the inevitable question is arising: "What do we do with this?" more

The New gTLD Market Will Improve Very Slightly Over the Next Year or So, ICANN Predicts

According to ICANN’s latest budget predictions, new gTLD market will improve very slightly over the next year or so. more

Automated Theft of Intellectual Property

A few days ago I wrote about a piece of my intellectual property, an article I wrote and posted on DaileyMuse.com, being stolen, plagiarized, and posted on another web site under a different authors name. I hadn't been looking for my work elsewhere, I was simply browsing the access logs and visiting other websites that stood out. As a result of finding my work posted elsewhere without my permission, I contacted the owner of the website by email and provided 24 hours to remove the content before I pursued legal action. more