/ Most Viewed

How to Choose a Cyber Threat Intelligence Provider

Throughout the course of my career I've been blessed to work with some of the most talented folks in the security and cyber threat intelligence (CTI) mission space to create a variety of different capabilities in the public, private and commercial sectors. Before I came to lead the Verisign iDefense team about five years ago, I had to evaluate external cyber-intelligence vendors to complement and expand the enterprise capabilities of my former organization. more

Learning from History: The Potsdam Call on Autonomous Weapon Systems

Eighty years ago, in August 1945, the world saw hope and horror. On August 1, 1945, just weeks after the adoption of the UN Charter, the leaders of the United States, the United Kingdom and the Soviet Union signed the Potsdam Agreement, which produced hope for a peaceful post-war world. Only some days later, the world saw the horror of nuclear bombs in Hiroshima and Nagasaki. A cold war followed. more

Wikileaks 2012, NSA 2013, NTIA Mishaps & Global Cyber Crime 2014: U.S. Exceptionalism over IG 2015?

The internet has become almost part of our daily involvement and reality is that it affects every facet of our modern lives. We are increasingly becoming dependent on the Internet, for which reason its availability, functionality, safety, stability and security are now of great and continuing concern to all of us and most importantly to US Congress, who so far has maintained stewardship over these key functions. more

Breaking It Down: the IANA Transition in Practical Pieces

As a Regional Internet Registry, APNIC has a strong interest in the Internet Assigned Numbers Authority (IANA), and the services it provides. We have followed the progress of IANA carefully, in particular through the evolution of ICANN, and the various steps taken by the US Government to reduce its level of oversight. Along with other RIRs, through the NRO, we have made several public statements about the IANA and its future development, mostly in response to US Government enquiries. more

$100 Million Lawsuit Filed Against VeriSign

Popular Enterprises LLC, the parent company of Netster.com, has filed a $100 million dollar lawsuit against VeriSign, Inc. The Complaint alleges antitrust violations, unfair competition and violations of the Deceptive and Unfair Trade Practices Act based upon VeriSign's release of the Site Finder product. The suit requests injunctive relief to prevent VeriSign from operating Sitefinder, and to otherwise cease what Popular Enterprises believes to be its monopolistic practices. more

Rationale for New gTLD Applicant Auctions to Resolve String Contentions

As Ray King emphasized in his post on private auctions, "[m]ost importantly, let's get moving -- private auction makes business sense, provides clarity and speeds the process for everyone." In the "get moving" spirit, I wish to answer a number of questions that I am frequently asked about private auctions in general and the Applicant Auctions in particular. more

Inevitability of Global Standards for Non-Terrestrial Spectrum Sharing

Three companies, SpaceX, OneWeb and Boeing have announced ambitious plans to put thousands of Internet-service satellites in non-geostationary low-Earth orbit (NGSO) and other companies like ViaSat and SES are currently operating hundreds of communication satellites in medium-Earth and higher, geostationary orbits. With so many satellites orbiting in different planes and at different altitudes, there are bound to be frequent "inline events"... more

July 2010: The End of the Beginning for DNSSEC

July 15, 2010 (yesterday) marked the end of the beginning for DNSSEC, as the DNS root was cryptographically signed. For nearly two decades, security researchers, academics and Internet leaders have worked to develop and deploy Domain Name System Security Extensions (DNSSEC). DNSSEC was developed to improve the overall security of the DNS, a need which was dramatized by the discovery of the Kaminsky bug a few years ago. more

Comcast’s Wrong Approach

Internet Service Providers (ISPs) have to do a lot more than just provide a pipe from your residence to their facilities to assure that you have a good Internet experience. There is a raging debate, inextricable from the debate on Network Neutrality, both on what the proper responsibilities of an ISP are AND what methods are proper for carrying out those responsibilities. more

Russian Hackers Have Penetrated U.S. Electric Utilities

U.S. federal government officials have revealed Russian hackers have been able to gain access to the networks of electric utilities in the country, according to a report by The Wall Street Journal. more

ICANN and the Red Cross: An Exceptional Exception

ICANN's policy on the special protection of the Red Cross and the International Olympic Committee (IOC) names has triggered a very lively discussion including contributions by Konstantinos Komatis, Milton Muller, Wolfgang Kleinwächter, and myself (with Avri Doria's reply). There is an agreement that the exceptions are dangerous for ICANN's gTLD policy process which is in a formative and delicate phase. more

2019 Will Be the Year of New gTLDs, Wired Predicts

In an article published today on the state of new top-level domains, Wired says "2019 could be the year of the obscure domain name." more

Who Are the Major New gTLD Applicants and… (Part Five: Rightside Registry)

Rightside is a name you may only have heard of very recently. It is a relative newcomer in the new gTLD industry. It is important to note that there is a difference between "Rightside" and "Rightside Registry". One is the Trademark and also the name of this new group to which eNom (a Registrar), Namejet (a platform to buy/sell domain names and Premium domains) and Name.com (another Registrar) belong. As for "Rightside Registry", it is the new name of the platform to operate new gTLD applications. more

The One Reason Net Neutrality Can’t Be Implemented

Suppose for a moment that you are the victim of a wicked ISP that engages in disallowed "throttling" under a "neutral" regime for Internet access. You like to access streaming media from a particular "over the top" service provider. By coincidence, the performance of your favoured application drops at the same time your ISP launches a rival content service of its own. You then complain to the regulator, who investigates... It seems like an open-and-shut case of "throttling" resulting in a disallowed "neutrality violation". Or is it? more

Fighting Phishing with Domain Name Disputes

I opened an email from GoDaddy over the weekend on my phone. Or so I initially thought. I had recently helped a client transfer a domain name to a GoDaddy account (to settle a domain name dispute), so the subject line of the email -- "Confirm this account" -- simply made me think that I needed to take another action to ensure everything was in working order. But quickly, my radar went off. more