Hot Topics:   Law    Policy & Regulation    Security    Domain Names    Internet Governance    Cybercrime    Top-Level Domains    more...

Featured Blogs

If Slate Comes in Standard Sizes, Why Not Broadband?

Martin Geddes Last week I was at the National Slate Museum in Wales watching slate being split apart. On the wall were sample pieces of all the standard sizes. These have cute names like "princess". For each size, there were three standard qualities: the thinnest are the highest quality (at 5mm in thickness), and the thickest have the lowest quality (those of 13mm or more). Obviously, a lighter slate costs less to transport and lets you roof a wider span and with less supporting wood, hence is worth more. more»

Cyber-Terrorism Rising, Existing Cyber-Security Strategies Failing, What Are Decision Makers to Do?

Khaled Fattal While conventional cyber attacks are evolving at breakneck speed, the world is witnessing the rise of a new generation of political, ideological, religious, terror and destruction motivated "Poli-Cyber™" threats. These are attacks perpetrated or inspired by extremists' groups such as ISIS/Daesh, rogue states, national intelligence services and their proxies. They are breaching organizations and governments daily, and no one is immune. more»

How a 'Defensive Registration' Can Defeat a UDRP Complaint

Doug Isenberg A company that registers a domain name containing someone else's trademark may be engaging in the acceptable practice of "defensive registration" if (among other things) the domain name is a typographical variation of the registrant's own trademark. That's the outcome of a recent decision under the Uniform Domain Name Dispute Resolution Policy (UDRP), a case in which the domain name in dispute, idocler.com, contained the complainant's DOCLER trademark -- but also contained a typo of the respondent's DOLCER trademark. more»

Zero-Touch Provisioning… Really?

Ronan Bracken Zero-touch provisioning (ZTP) -- whatever does that mean? Of course, it is another marketing term. I think the term "closer to zero touch provisioning" is probably better, but CTZTP -- as opposed to ZTP -- is a bit more of a mouthful. Whenever I hear language like this that I'm not familiar with, I get struck by a bolt of curiosity. What is this new and shiny phrase that has just appeared as if from nowhere? more»

History is Written and Revised by the Winners - Can the Internet Archive Change That?

Larry Press I was naively optimistic in the early days of the Internet, assuming that it would enhance democracy while providing "big data" for historians. My first taste of that came during the Soviet coup attempt of 1991 when I worked with colleagues to create an archive of the network traffic in, out and within the Soviet Union. That traffic flowed through a computer called "Kremvax," operated by RELCOM, a Russian software company. The content of that archive was not generated by the government or the establishment media -- it was citizen journalism... more»

Fairness & Due Process Require Changes to ICANN's "Updated Supplementary Procedures" to the IRP

Kathy Kleiman The Updated Supplementary Procedures for Independent Review Process ("IRP Supplementary Procedures") are now up for review and Public Comment. Frankly, there is a lot of work to be done. If you have ever been in a String Objection, Community Objection, or negotiated a Consensus Policy, your rights are being limited by the current way the IRP Supplementary Procedures proposal is structured. With timely edits, we can ensure that all directly-impacted and materially-affected parties have actual notice of the IRP proceeding... more»

Should You Pay Ransomware Demands?

Rachel Gillevet Ransomware is a huge problem for small and medium businesses, and the most important question is this: should you pay the ransom? Ransomware has proven a successful revenue generator for criminals, which means the risk to businesses will grow as ransomware becomes more sophisticated and increasing numbers of ethically challenged criminals jump on the bandwagon. more»

New Report on "State of DNSSEC Deployment 2016" Shows Continued Growth

Dan York Did you know that over 50% of .CZ domains are now signed with DNS Security Extensions (DNSSEC)? Or that over 2.5 million .NL domains and almost 1 million .BR domains are now DNSSEC-signed? Were you aware that around 80% of DNS clients are now requesting DNSSEC signatures in their DNS queries? And did you know that over 100,000 email domains are using DNSSEC and DANE to enable secure email between servers? more»

How a Plaintiff Was Undeceived and Lost at Spam Litigation - What Nobody Told You About!

Robert Cannon Back in 2003, there was a race to pass spam legislation. California was on the verge of passing legislation that marketers disdained. Thus marketers pressed for federal spam legislation which would preempt state spam legislation. The Can Spam Act of 2003 did just that... mostly. "Mostly" is where litigation lives. According to the Can Spam Act preemption-exception... more»

CircleID's Top 10 Posts of 2016

The new year is upon us and it's time for our annual look at CircleID's most popular posts of the past year and highlighting those that received the most attention. Congratulations to all the 2016 participants and best wishes to all in the new year. more»

Internet Governance Outlook 2017: Nationalistic Hierarchies vs. Multistakeholder Networks?

Wolfgang Kleinwächter Two events, which made headlines in the digital world in 2016, will probably frame the Internet Governance Agenda for 2017. October 1, 2016, the US government confirmed the IANA Stewardship transition to the global multistakeholder community. November 2, 2016, the Chinese government announced the adoption of a new cybersecurity law which will enter into force on July 1, 2017. more»

Parsing Domain Names Composed of Random Letters for Proof of Cybersquatting

Gerald M. Levine The Respondent's cry of pain in AXA SA v. Whois Privacy Protection Service, Inc. / Ugurcan Bulut, axathemes, D2016-1483 (WIPO December 12, 2016) "[w]hat do you want from me people? I already removed all the files from that domain and it's empty. What else do you want me to do???" raises some interesting questions. "A," "x," and "a" is an unusual string of letters but unlike other iconic strings such as "u," "b" and "s" and "i", "b" and "m" for example that started their lives as the first letters of three-word brands AXA is not an acronym. more»

Is Proprietary Dead?

Russ White A new age of openness is coming upon us. At least that's what we're being told. For instance -- "The reign of closed solution suites is over, shifting to the rise of open, heterogeneous software ecosystems." Maybe it's my 30 years in the information technology business (how many people remember Thomas-Conrad ARCnet hardware?), but I'm not convinced. It's worth taking a moment to consider the case. more»

It's Official: 2016 Was a Record Year for Domain Name Disputes

Doug Isenberg As I predicted more than three months ago, 2016 turned out to be a record year for domain name disputes, including under the Uniform Domain Name Dispute Resolution Policy (UDRP). That's according to statistics from the World Intellectual Property Organization (WIPO), the only UDRP service provider that publishes real-time data on domain name disputes. WIPO's statistics show 3,022 cases in 2016 -- an increase of almost 10 percent from 2015. The previous most-active year for domain name disputes was 2012... more»

2016 New gTLD Year in Review (Infographic)

Christa Taylor This post provides an overview of The 2016 New gTLD Year in Review infographic, reflecting on some of the intriguing highlights of the gTLD industry. The data analyzed within the infographic is based on the following: New Top Level Domains (TLDs) contained in the data set reflect open TLDs and exclude single registrants such as brands; For greater insight, TLDs have been separated into four quartiles or 'tiers' with tier 1 being the top 25% and tier 4 being the bottom 25%... more»

News Briefs

Former New York City Mayor Rudy Guliani Appointed to "Chair" Cyber Task Force

Transition spokesman Sean Spicer told reporters today that former New York City Mayo, Rudy Giuliani will "chair" the cyber task force that Trump announced last Friday. The task force is given three months from Trump's inauguration to deliver a cybersecurity plan. ›››

U.S. Department of Commerce Issues IoT Advancement Guidelines

The Department of Commerce issues a green paper outlining guiding principles and ways to support the advancement of the Internet of Things (IoT). ›››

Alphabet Shuts Down Its Solar-Powered Internet Drone Program

"Alphabet cuts former Titan drone program from X division, employees dispersing to other units," reports Seth Weintraub today in 9TO5Google. ›››

Ransomware Crime Bill Goes into Effect in the State of California

As of January 1, the delivery of ransomware is illegal in California as per Senate Bill 1137 going into effect. ›››

FTC Announces Internet of Things Challenge, Offers $25,000 for Best Technical Solution

The Federal Trade Commission is challenging the public to create an innovative tool to help protect consumers from security vulnerabilities in the software of home devices connected to the Internet of Things. ›››

Over 50 Internet Shutdowns Reported in 2016

"Governments around the world shut down the internet more than 50 times in 2016 -- suppressing elections, slowing economies and limiting free speech," Lyndal Rowlands reporting in IPS. ›››

Court Refuses Injunction in .africa TLD Case

"DotConnectAfrica's attempt to have ICANN legally blocked from delegating the .africa gTLD to rival applicant ZACR has been denied," Kevin Murphy reporting in Domain Incite. ›››

Trump Names Former Bush Aide Thomas Bossert Chief Adviser on Cybersecurity, Counterterrorism Role

President-elect Donald J. Trump has named Thomas P. Bossert, a top national security aide under President George W. Bush, to be his homeland security adviser, the Trump transition team announced Tuesday morning," Michael D. Shear reporting in the New York Times. ›››

China Says It Will Use All Means, Including Military, to Ensure Online Security

"Beijing vowed on Tuesday to use all necessary means, including military ones, to wipe out subversion and attempts to undermine its sovereignty in cyberspace," Zhuang Pinghui reporting in South China Morning Post. ›››

Tom Wheeler Announces Resignation as FCC Chairman

Federal Communications Commission Chairman Tom Wheeler has announced he will leave the agency on January 20, the day of President-elect Donald Trump's inauguration. ›››

Google Begins Publicly Sharing National Security Letters

In a note released this week, Google announced that it will begin publicly sharing National Security Letters (NSLs) it receives that have been freed of nondisclosure obligations either through litigation or legislation. ›››

China Shuts Down Thousands of Websites for 'Harmful', Obscene Content

China has shut down or 'dealt with' thousands of websites for sharing 'harmful' erotic or obscene content since April, the state's office for combating pornography and illegal publications announced on Thursday. ›››

Yahoo Reveals Over One Billion More Accounts Have Been Hacked

Just a few months after Yahoo confirmed a massive data breach impacting half a billion users, the company today disclosed a second major breach of its systems affecting over a billion users. ›››

Google Signs Internet Deal With Cuba

Google has signed an agreement with the Cuban government allowing internet users on the Communist-run island quicker access to its branded content. ›››

Internet Governance Forum Puts the Spotlight on Trade Agreements

"This year was the first year in which the spotlight fell on the use of trade agreements to make rules for the Internet behind closed doors, and a broad consensus emerged that this needs to change," Jeremy Malcolm reporting today from EFF. ›››

AT&T CEO Confident Trump-Appointed FCC Will Scrap Net Neutrality Regulations

AT&T's regulatory problems are melting away as the inauguration of President-elect Donald Trump draws near. ›››

Internet Society Urges for Increased Effort to Address Unprecedented Challenges Facing the Internet

During the 11th Internet Governance Forum (IGF), a United Nations-convened conference taking place in Mexico, 6-9 December, the Internet Society urged the global Internet community to redouble its efforts in addressing the wave of unprecedented challenges facing the Internet. ›››

Over $31 Million Stolen by Hackers from Russian Central Bank

Hackers have stolen over 2 billion rubles ($31 million) from correspondent accounts at the Russian central bank, the bank reported today. ›››

Cyberattack Cuts Off Thousands of TalkTalk, Post Office Customers in UK

Thousands of TalkTalk and Post Office customers in the UK have had their Internet access cut by an attack targeting certain types of Internet routers, according to a BBC report on Thursday. ›››

Gambia Criticized for Shutting Down Communication Networks on Election Day

"Communication blackout shatters illusion of freedom during the election," says Amnesty International in a statement on Thursday. ›››

Popular News – Last 30 Days

Recent Comments

ICANN Fails Consumers (Again)
The Christmas Goat and IPv6 (Year 7)
Should You Pay Ransomware Demands?
ICANN Fails Consumers (Again)
ICANN Fails Consumers (Again)

Sponsored Topics

Verisign

Security

Sponsored by
Verisign
Afilias - Mobile & Web Services

Mobile

Sponsored by
Afilias - Mobile & Web Services
Port25

Email

Sponsored by
Port25
Afilias

DNS Security

Sponsored by
Afilias

Industry Updates

Michele Neylon Appointed Chair Elect of i2Coalition

i2Coalition The Internet Infrastructure Coalition (i2Coalition) announced that Blacknight CEO, Michele Neylon has been appointed Chair Elect of its Board of Directors. Mr. Neylon's position as Chair Elect became effective on January 1st, 2017 and will assume his role as Chair on January 1st, 2018. more»

Neustar to be Acquired by Private Investment Group Led by Golden Gate Capital

Neustar Neustar today announced that it has entered into a definitive agreement to be acquired by a private investment group led by Golden Gate Capital in a transaction valued at approximately $2.9 billion, including debt to be refinanced. more»

Startup League Reports from WebSummit, Lisbon

Radix Radix, the portfolio Registry behind 8+ popular extensions such as .online, .store, .tech took its latest venture, the Startup League to its first conference, WebSummit earlier this week. more»

Verisign Q3 2016 DDoS Trends Report: User Datagram Protocol (UDP) Flood Attacks Continue to Dominate

Verisign Verisign has released its Q3 2016 DDoS Trends Report providing a unique view into online distributed denial of service (DDoS) attack trends from mitigations enacted on behalf of Verisign DDoS Protection Services and research conducted by Verisign iDefense Security Intelligence Services. more»

2016 U.S. Election: An Internet Forecast

i2Coalition The unexpected election of Donald Trump, along with continued Republican control of both houses of Congress will have a big impact on our US priorities. While the outlook remains unclear, we've prepared the memo below examining the initial impact the election may have on issues that matter to Internet infrastructure companies and organizations. more»

.SPACE Becomes the Choice of the First Ever Space Nation Asgardia

Radix A group of scientists launched the first ever space nation at a press conference in Paris earlier last month.. Asgardia is the prototype of a free society in space. It aims to launch its first satellite in 2017 and be recognized by the UN. more»

Government Guidance for Email Authentication Has Arrived in USA and UK

ValiMail We recently discussed governmental organizations that send out warnings rather than preventing spear phishing attacks through email authentication. Therefore it's good to see a pair of prominent governmental organizations giving clear guidance to their constituents about using DMARC to enforce authenticity of email on their domains. The British Government Digital Service announced in June an upcoming requirement that all services using subdomains of gov.uk would need to have a DMARC policy at enforcement. more»

Afilias Chairman Jonathan Robinson Wins ICANN's 2016 Leadership Award at ICANN 57

Afilias Afilias, a leading domain registry operator, congratulates Jonathan Robinson, Executive Chairman of Afilias' Board of Directors, on receiving the Internet Corporation for Assigned Names and Numbers (ICANN) 2016 Leadership Award for his contributions to the ICANN and broader internet community. more»

ValiMail Raises $12M for Its Email Authentication Service

ValiMail The company will use the funds to meet the rapidly expanding demand for its patent-pending authentication platform which brings visibility, control, compliance, and security to cloud-based email services. more»

MarkMonitor Supports Brand Holders' Efforts Regarding .Feedback Registry

MarkMonitor In the capacity that MarkMonitor has as an ICANN accredited registrar, we have observed numerous issues with registrations in the .feedback registry. These issues date back to the initial launch of .feedback earlier this year. more»

Don't Gamble With Your DNS

Neustar When it comes to something as important as DNS, the entity responsible for keeping your website online, some companies choose to play Russian roulette with their strategy by just using one DNS provider. more»

Companies

Community  –  CircleID Participants  |  View All  |  Join CircleID

Dr. James Galvin
Director, Technical Standards at AfiliasJoined on Oct 07, 2009

Terry Zink
Program ManagerJoined on Aug 20, 2007

Karen Rose
Senior Director, Office of Strategy and Research, Internet SocietyJoined on Apr 27, 2015

Michael D. Palage
Intellectual Property Attorney and IT ConsultantJoined on Aug 30, 2006

Scott Hollenbeck
Senior Director of the Verisign Registry Services LabJoined on Jan 24, 2014

Naseem Javed
Expert: Global Naming Complexities, Corporate Nomenclature, Image & BrandingJoined on Dec 17, 2003

Mason Cole
VP, Communications and Industry Relations at DonutsJoined on Jul 22, 2003

Paul Wilson
Director General of APNICJoined on Nov 13, 2003

Bruce Sinclair
CEO, gogo6Joined on May 23, 2012

Robert Guerra
Managing Director, PrivaterraJoined on Aug 08, 2005

Bruce Van Nice
Director of Product Marketing at NominumJoined on Feb 12, 2009

Bill Thompson
Journalist, Commentator and Technology CriticJoined on Sep 09, 2004

Richard Bennett
Senior Research FellowJoined on Oct 23, 2007

John Yunker
Author and founder of Byte Level ResearchJoined on Dec 19, 2006

Benjamin Edelman
Assistant Professor, Harvard Business SchoolJoined on Jun 14, 2003

Steve DelBianco
Executive Director at NetChoiceJoined on Jan 11, 2009

Tobias Flaitz
Chief Executive Officer at Sedo Holding AGJoined on Oct 05, 2011

Alex Deacon
Senior Vice President, Internet Technology at MPAAJoined on Jun 12, 2015

Veni Markovski
Joined on Sep 07, 2005

Mirjam Kuehne
Joined on Sep 23, 2010

Guillaume Pahud
CEOJoined on Jan 18, 2016

Tom Evslin
Joined on Apr 24, 2007

Sam Johnston
Director, Cloud & IT Services at EquinixJoined on Sep 02, 2008

Udeme Ukutt
Joined on Oct 15, 2010

Irwin Lazar
AnalystJoined on Apr 24, 2007

Peter Cramton
Chairman, Cramton Associates; Professor of Economics, University of MarylandJoined on Nov 14, 2012

Richard J Tindal
Joined on Feb 07, 2009

Russ White
Network Architect at LinkedInJoined on Jul 21, 2016

Wil Tan
CTO, Cloud Registry -- innovative TLD registry back-end providerJoined on Oct 25, 2006

Lauren Price
Sr. Product Marketing Manager, .ORG, The Public Interest RegistryJoined on Feb 28, 2009