/ Most Viewed

White House Announces Agenda for Game-Changing Cybersecurity R&D

The United States White House Office of Science and Technology Policy (OSTP) has released a new report titled, Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program, specifying an agenda for "game-changing" cybersecurity R&D according to an official announcement today. The report is described as "a roadmap to ensuring long-term reliability and trustworthiness of the digital communications network that is increasingly at the heart of American economic growth and global competitiveness." more

VeriSign to Recognize Innovators, Leaders That Have Shaped the First 25 Years of .Com

For the upcoming 25th anniversary of .com Top-Level Domain, VeriSign, the registry operator of the domain will launch a year-long initiative to celebrate the event. From the announcement: "In March 1985, the first .com domain was registered, igniting the birth of the consumer Internet that, 25 years later, continues to transform communications, commerce and our society as a whole. Beginning in March 2010, VeriSign, the long-time operator of the .com domain, will lead an industry-wide initiative to recognize the innovators and leaders that have shaped the first 25 years of .com and in doing so transformed our economy and society. The celebration of "25 Years of .com" will kick off with a policy-focused event in Washington, DC on March 16." more

Antigua to Host CaribNOG 18 in September

Antigua and Barbuda will host the eighteenth regional meeting of the Caribbean Network Operators Group (CaribNOG) from September 25 to 27. CaribNOG is a vibrant community of professionals committed to improving the region’s networks, expanding the technical capacity of those who build and secure them, and strengthening the interconnections among all actors in the Internet space. more

Finding the Holes in Your Application Security Blanket

Last month, application security provider Veracode came out with a study that stated that more than half of all enterprise applications aren't secure. The company tested approximately 2,900 applications over an 18-month period, and 57 percent failed to meet Veracode's "acceptable levels" of security. While this study gained a tremendous amount of traction in the media... it does not focus on the bigger issue... more

2012 WCIT Meeting Beginning of Long Internet Cold War Between Authoritarians and Liberal Democrats

In his commentary, The Internet Yalta Alexander Klimburg, Fellow and Senior Adviser at the Austrian Institute for International Affairs, argues that the December 2012 meeting of the World Conference on International Telecommunications (WCIT) may be the digital equivalent of the February 1945 meeting of the Allied powers in Yalta: the beginning of a long Internet Cold War between authoritarian and liberal-democratic countries. more

New Bill Bans Internet Companies From Offering Unbreakable Encryption

Companies such as Apple, Google and others will be banned from offering encryption so advanced that even they cannot decipher it when asked to under the UK's Investigatory Powers Bill. more

Massive Data Breach Hits HCA: 11 Million Records Compromised

In what is currently the largest healthcare industry data breach, Hospital Corporation of America (HCA) has confirmed the theft of 11 million patient records. HCA, one of the country's most prominent healthcare providers, believes the breach originated from an external storage system used for email automation. more

Eugene Kaspersky: We Need Interpol for Internet, Law Enforcement Agencies Have Jurisdictional Limits

Eugene Kaspersky, co-founder of Internet security software Kaspersky Lab, was recently interviewed PC World where he talked about his views regarding cybersecurity and the evolution of malware. In response to fixing the problems with malware on the Internet, Kapersky says: "The Internet was never designed with security in mind. If I was God, and wanted to fix the Internet, I would start by ensuring that every user has a sort of Internet passport: basically, a means of verifying identity, just like in the real world, with driver's licenses and passports and so on. The second problem is one of jurisdiction. The Internet has no borders, and neither do the criminals who operate on the Internet. However, law enforcement agencies have jurisdictional limits, and are unable to conduct investigations across the globe. ... There is no such thing as anonymity on the Internet, for the average user." more

9th Registration Operations Workshop (ROW), June 16th, 2020, Online

The Registration Operations Workshop (ROW) was conceived as an informal industry conference that would provide a forum for discussion of the technical aspects of registration operations in the domain name system and IP addressing. The 9th ROW will be held online on Tuesday, June 16th, 2020 at 13h00-16h00 UTC. more

The US-China Cold War in Cyberspace

In 2019 and 2020, the economic conflict between the US and China reached a peak. There was a months-long tariff battle that is still not fully resolved. After blocking Chinese-centered equipment manufacturer Huawei from its own markets, the US pushed hard to get the Five Eyes and all of its allies to block Huawei from foreign markets, too. Then the US started blocking its own companies... more

A Chance to Tackle the Urban Digital Divide

For the first time in my career, we face the possibility of some big changes for broadband in low-income neighborhoods in cities. The recent American Rescue Plan Act (ARPA) gave cities significant funding that can be used for various kinds of infrastructure, including broadband. Cities have been handed a once-in-a-lifetime chance to fix some of the broadband deserts that have grown in poor neighborhoods. I'm already working with several cities that are taking this opportunity seriously. more

EU Lawmakers Call for Further Talks to Strengthen Proposed US Data Transfer Pact

EU lawmakers are pushing for additional negotiations to strengthen a proposed data transfer agreement between the European Union (EU) and the United States. They argue that the current agreement still has shortcomings that must be addressed. The potential delay in reaching an accord is concerning for the thousands of companies that rely on the agreement. more

Domain Name Variants Still Won’t Work

ICANN has spent years trying to figure out what to do with domain name variants, strings that look different but mean the same thing, for some definition of "the same." They've been trying to deal with them in second level domains for a decade, and are now working on rules to allow variant top-level domains. Unfortunately, variants don't work. The problem isn't putting them in the DNS; it's that once they're in the DNS, they don't work anywhere else. more

TLDs of Vacant or Close to Vacant Places in the World

Royal Pingdom has put together a list of top ten places with designated country code Top-Level Domains that are barely inhabited. The list starts off with '.hm' for Heard and McDonald Islands, an Australlian territory, with zero population. Others include '.pn' for Pitcairn Islands (Population: 50), '.tf' for French Southern and Antarctic Lands (Population: 140), '.cc' for Cocos (Keeling) Islands (Population: 596) and '.va' for the Vatican City (Population: 826). more

Video Interviews from ICANN 52 in Singapore

CircleID in collaboration with the team from Dyn Inc. and ICANNWiki, brings you the following video interviews conducted by Susan Chalmers at ICANNWiki during the ICANN 52 meetings in Singapore (8- 2 February 2015). more