We've just published the 2023 edition of the DOTZON study "Digital City Brands." After introducing the study in early 2017, DOTZON has mapped how successful cities are using their Digital City Brands for the seventh year in a row. The Digital City Brand is the digital dimension of the City Brand and mirrors the "Digitalness" of a city. The advent of the Internet was why Digital City Brands came into being in the first place. more
Interested in learning more about routing security? How it can affect your connectivity supply chain? What are best practices for enterprises and organizations? What is the role of CSIRTs in securing routing? What are governments doing now, and planning to do in the future around routing security? more
Afnic, the association responsible for several Internet Top Level Domains, including the .fr country-code Top Level Domain, has published the 2022 edition of its annual analysis under the title “The Global Domain Name Market”. Here are some highlights of this study. The domain name market posted aggregate growth of +1.9% in 2022, an acceleration that reflects a break in the trend observed since 2019. As we foresaw in last year’s report, 2021 was the “trough” year, with a relative improvement over 2022. more
On Friday, 23rd June, Caribbean telecommunications operators (telcos) held a meeting in Miami to fine tune their strategy to force Big Tech companies to contribute financially to regional telecoms network infrastructure. Hosted by the Caribbean Telecommunications Union (CTU), and taking a similar perspective to the "fair share" proposal currently being debated in the European Union, regional network operators are arguing that over-the-top (OTT) service providers are responsible for 67 percent of the total Internet traffic in the Caribbean, but make no contributions or investments toward local delivery networks. more
Project Liberty's Institute sat down with Dave Clark, an early contributor to the TCP/IP protocols that built and run the Internet, and one of the expert advisors on DSNP, the Decentralized Social Networking Protocol. Dave Clark is Senior Research Scientist at MIT's Computer Science and Artificial Intelligence Laboratory (CSAIL) and Fellow of the National Academy of Engineering and the American Academy of Arts and Sciences. more
A significant segment of the IoT ecosystem, the Internet of Medical Things (IoMT), is projected to grow at a compounded annual growth rate of 23.7 percent (forecast period: 2022 -- 2032). This fast growth is indicative of how rapidly IoTM is integrating into modern society, which has understandably attracted the attention of regulators. The widespread use of IoTM devices means that their malfunction or dysfunction can affect the health and lives of many. more
For a long time, arguments about the meaning of "DNS Abuse" prevented fruitful discussions within the ICANN community on when and how it is appropriate to act at the level of the DNS to address abuses online. The proposed amendments to RA and RAA agreements represent a significant and welcomed step in the right direction. As Secretariat of the Internet & Jurisdiction Policy Network (I&JPN), we strongly encourage their adoption... more
OpenXDR is one of the most cost-effective SIEM alternatives that help businesses detect and mitigate threats within hectic modern architectures. A single cyber incident impacts every aspect of a business -- from system downtime, revenue losses, and reputation damage to disrupted operations. more
The Canadian International Pharmacy Association (CIPA) recently achieved a major milestone: We celebrated our 20-year anniversary, serving millions of customers around the world who otherwise would not afford, access or trust ordering their daily maintenance medications where they live. Founded in 2002 by a group of Canadian pharmacists who recognized the potential of the Internet to provide safe and affordable access to medications... more
The Registration Operations Workshop (ROW) was conceived as an informal industry conference that would provide a forum for discussion of the technical aspects of registration operations in the domain name system and IP addressing. The ROW series is being co-sponsored by Verisign and ICANN and organized by Cofomo, and we are looking forward to an engaging set of talks, panel discussions, and conversations with individuals involved with the operation of domain name registrations systems. more
As the current global geopolitical space becomes less friendly to Human Rights1, are there potential offsetting trends supporting them? Yes, but... it will require initiatives from the Global South for AI data-driven policies supportive of the UN's Sustainable Development Goals (SDGs), demonstrating the value of SDGs and Human Rights combined. more
Are Human Rights, both traditional and digital, at risk of becoming an empty promise? (a) The political environment for Human Rights has notably deteriorated since the United Nation's (UN) Universal Declaration of Human Rights (UDHR) in 1948. How have things changed? more
The pace of generative AI development has been astonishing to the degree that the normative space has been unable to keep up. As governments start looking into some implementations of the technology, such as ChatGPT, more advanced techniques and products continue to emerge by the day. Society is changing in irrevocable ways, and it is paramount that the Internet Governance community turns its attention to this question. more
The Decentralized Social Networking Protocol (DSNP) is a product developed by Project Liberty, an international non-profit founded by Frank McCourt, with the goal of transforming how the Internet works, who owns and controls personal data, and who benefits from the digital economy. The McCourt Institute, as the research and digital governance arm of Project Liberty, aims to support the development and management of DSNP. more
How bad is the human security weakness problem? Verizon's 2022 Data Breaches Investigations Report says 82 percent of data breaches have human involvement. This involvement can mean misconfigurations, poor security policy implementation, negligence, and falling prey to social engineering schemes. Essentially, a vast majority of data breaches have penetrated cyber defenses because of human carelessness, inconsistencies, and gullibility. more