Hot Topics:   Cybersecurity    Cybercrime    Domain Names    Policy & Regulation    Internet Governance    Access Providers    DNS   

Featured Blogs

5G for Fixed Connectivity in Cuba

Larry Press ETECSA reports that over 110,100 Cuban households have DSL connectivity using their Nauta Hogar service. There are also shared facilites – 986 WiFi hotspots (127 in Havana) and 347 Navigation Rooms (44 in Havana) with 1,309 computers (304 in Havana). These services are dead-ends on the road to hoped-for "computerization." The Cuban population is around 11 million so, after three years, roughly one person in 100 lives in a Nauta home and the services are limited geographically... more

The Early History of Usenet, Part III: File Format

Steven Bellovin When we set out to design the over-the-wire file format, we were certain of one thing: we wouldn't get it perfectly right. That led to our first decision: the very first character of the transmitted file would be the letter "A" for the version. Why not a number on the first line, including perhaps a decimal point? If we ever considered that, I have no recollection of it. more

The Early History of Usenet, Part II: Hardware and Economics

Steven Bellovin There was a planning meeting for what became Usenet at Duke CS. We knew three things, and three things only: we wanted something that could be used locally for administrative messages, we wanted a networked system, and we would use uucp for intersite communication. This last decision was more or less by default: there were no other possibilities available to us or to most other sites that ran standard Unix. Furthermore, all you needed to run uucp was a single dial-up modem port. more

The Early History of Usenet, Part I: The Technological Setting

Steven Bellovin Usenet -- Netnews -- was conceived almost exactly 40 years ago this month. To understand where it came from and why certain decisions were made the way they were, it's important to understand the technological constraints of the time. Metanote: this is a personal history as I remember it. None of us were taking notes at the time; it's entirely possible that errors have crept in, especially since my brain cells do not even have parity checking, let alone ECC. Please send any corrections. more

Cybersecurity Standards Practices as Cyber Threats

Anthony Rutkowski One of the most embarrassing and pernicious realities in the world of cybersecurity is the stark reality that some industry cybersecurity standards practices are themselves cyber threats. How so? Most industry and intergovernmental standards bodies serve as means for assembling the constantly evolving collective knowledge of participant experts and package the resulting specifications and best practices as freely available online documents to a vast, diverse universe of users. more

Do Cable Companies Have a Wireless Advantage?

Doug Dawson The big wireless companies have been wrangling for years with the issues associated with placing small cells on poles. Even with new FCC rules in their favor, they are still getting a lot of resistance from communities. Maybe the future of urban/suburban wireless lies with the big cable companies. Cable companies have a few major cost advantages over the wireless companies, including the ability to bypass the pole issue. The first advantage is the ability to deploy mid-span cellular small cells. more

Trump's Strange WRC-19 Letter

Anthony Rutkowski The 2019 World Radiocommunication Conference (WRC-19) is underway. It is the latest in a continuum of treaty-making gatherings that began in 1903 and is devoted to the now 116-year-old art of globally carving up the radio spectrum among designated uses that is instantiated in the Radio Regulations treaty agreement. Not unexpectedly, the event includes designation of 5G spectrum that flows from the requirements long set in 3GPP and GSMA. more

What to Expect From SpaceX Starlink Broadband Service Next Year and Beyond

Larry Press Last May, SpaceX founder Elon Musk tweeted "6 more launches of 60 sats needed for minor coverage, 12 for moderate" and SpaceX President and CEO Gwynne Shotwell recently said they planned to be offering service in parts of the US in mid-2020, which would require six to eight 60-satellite launches. The first of those launches will be in the middle of this month on a thrice-flown Falcon 9 booster. (They will also need customer terminals and Elon Musk has used a prototype to post a tweet from his home). more

DNS Wars

Geoff Huston The North American Network Operators' Group (NANOG) is now quite an institution for the Internet, particularly in the North American Internet community. It was an offshoot of the Regional Techs meetings, which were part of the National Science Foundation Network (NSFNET) framework of the late 80s and early 90s. NANOG has thrived since then and is certainly one of the major network operational forums in today's Internet – if not the preeminent forum for network operators for the entire Internet. more

Considerations on the High-Level Panel's "Internet Governance Forum Plus" Model

William J. Drake The Fourteenth Annual Meeting of the Internet Governance Forum (IGF) will convene in Berlin three weeks from tomorrow. One of the highlights of the meeting could be the main session on Internet Governance and Digital Cooperation that is to be held on Day 1, 26 November 2019. The session is to consider some of the recommendations contained in the June report from the UN Secretary-General's High-level Panel on Digital Cooperation, most notably the panel's proposal to revamp the IGF... more

Challenging Domain Names for Abusive Registration: UDRP and ACPA

Gerald M. Levine There are predatory-domain name registrants, and there are registrants engaged in the legitimate business of acquiring, monetizing and reselling domain names. That there are more of the first than the second is evident from proceedings under the Uniform Domain Name Dispute Resolution Policy (UDRP). "Given the human capacity for mischief in all its forms, the Policy sensibly takes an open-ended approach to bad faith, listing some examples without attempting to enumerate all its varieties exhaustively. more

More Privacy for Domain Registrants – Heightened Risk for Internet Users

Frederick Felman A recent exchange on CircleID highlighted a critical need for data to inform the debate on the impact of ICANN's post-GDPR WHOIS policy that resulted in the redaction of domain name registrant contact data. A bit of background: in my original post, I made the point that domain name abuse had increased post-GDPR. A reader who works with a registrar (according to his bio) commented: "Can you back up that statement with data? Our abuse desk has actually seen a reduction in abuse complaints." more

Monetising Solutions for the Telcos

Paul Budde Developments in the telecommunications industry and the broader digital economy have opened up many new markets over the last few decades. Telecoms has changed from a more or less standalone, horizontally-organized industry to one that has become a key facilitator in a range of vertical markets. The keyword that is used to indicate that change is "smart." We are talking about smart transport, smart energy, smart cities and so on. more

Will Legacy TLDs Have a Long Legacy?

Matt Langan We all live in a world where the rapid pace of innovation can be both exciting and challenging. From keeping up with the latest consumer technologies, such as new mobile apps, social media platforms, and digital assistants like Alexa to business-driven innovations like Things (IoT) to Artificial Intelligence, the one certain thing we all face is change. In the Top-Level Domain (TLD) arena, can the same be said about legacy TLDs? more

.COM Contract Amendment Coming Soon for Public Comment

Greg Thomas Last Thursday, during VeriSign's Q3 2019 quarterly earnings call, CEO Jim Bidzos offered statements that seemed to be carefully calibrated to satisfy Wall Street's curiosity about protracted negotiations with ICANN on a Third Amendment to the .com Registry Agreement while also appearing to distance the company from the soon-to-be forthcoming product of that year-long effort. more

News Briefs

Microsoft Announces Plans to Adopt DoH in Windows

Microsoft announced today its plans to adopt DNS over HTTPS (DoH) protocol in Windows and will also keep other options such as DNS over TLS (DoT) on the table for consideration. more

Iran Almost Completely Shuts Off Internet Access Across the Country Amid Protests Over Fuel Prices

Iran has almost entirely shut down internet access across the country amid protests over an increase in fuel prices. more

Internet Commerce Association Calls for ICANN to Withhold Approval of .Org Sale

The Internet Commerce Association (ICA) in an open letter issued today, has asked ICANN to withhold the approval of the assignment of the .ORG top-level domain to the private equity company Ethos Capital. more

Ethos Capital to Acquire .ORG Top-Level Domain

The Internet Society and Public Interest Registry (PIR) have reached an agreement with Ethos Capital, under which Ethos Capital will acquire PIR and all of its assets from the Internet Society. Public Interest Registry (PIR) is the nonprofit corporation that operates the .ORG top-level domain. more

Cybersecurity Workforce Needs to Grow 145% to Close Skills Gap Worldwide, Says New Study

The cybersecurity workforce needs to grow by 145% to close the skills gap and better defend organizations worldwide according to a report released by (ISC)², a nonprofit membership association of certified cybersecurity professionals. more

Colombian Government Releases Action Plan for the Selection of .CO Domain Registry Operator

In light of the approaching expiration of the .CO top-level domain registry operator contract, Columbia's Ministry of Information Technology and Communications (MinTIC) today released an action plan for the .co operator selection process. more

"lo" and Behold

Happy 50th Internet! On October 29, 1969, at 10:30 p.m. Leonard Kleinrock, a professor of computer science at UCLA along with his graduate student Charley Kline sent a transmission from UCLA's computer to another computer at Stanford Research Institute via ARPANET, the precursor to the internet. more

EFF: For ISPs to Retain Power to Censor the Internet, DNS Needs to Remain Leaky

EFF's Senior Legislative Counsel, Ernesto Falcon, in a post on Monday has argued that major ISPs in the U.S. -- the likes of Comcast, AT&T;, and Verizon -- are aggressively influencing legislators to stop the deployment of DNS over HTTPS (DoH), "a technology that will give users one of the biggest upgrades to their Internet privacy and security since the proliferation of HTTPS." more

IETF Appoints Its First Executive Director

IETF today announced that Jay Daley is appointed as the first permanent Executive Director of the organization. IETF had 134 applicants for the position since it began the hiring process in May of this year. more

New Zealand's Top-Level Domain Manager Seeking New Registry Service Provider for .nz

The manager for .nz announced today that they have launched a registry replacement process and are calling for expressions of interest from potential service providers by November 29th. more

Leading Domain Registries and Registrars Release Joint Document on Addressing 'DNS Abuse'

A group of leading domain name registries and registrars have joined forces in the fight against abuse in the Domain Name System (DNS), by developing a "Framework to Address Abuse." Each contributing company has shared its expertise and experience mitigating abusive practices with the goal of submitting the resulting Framework as a foundational document for further discussion in the multistakeholder community.  more

Germany's New Rules for Developing 5G Mobile Networks Will Not Exclude China's Huawei Technologies

German regulators have released a set of guidelines addressing network security for companies wanting to help build next-generation 5G infrastructure. more

China's App Allows "Superuser" Access to Entire Data of Over 100 Million Android-Based Phones

The Chinese Communist Party's app called Study the Great Nation released in January is reported to have "superuser" access to the entire data of over 100 million Android-based phones via a backdoor. more

China to Require Face Scan for Internet Access and New Phone Numbers Starting December

Chinese citizens will be required to let telecommunications carriers to scan their faces in order to sign up for internet access or to get a new phone number. more

EU Member States Release Report on Coordinated Risk Assessment on Cybersecurity in 5G Networks

European Union Member States published a report on the 'EU coordinated risk assessment on cybersecurity in Fifth Generation (5G) networks'. The report is based on the results of the national cybersecurity risk assessments by all EU Member States. It identifies the main threats and threats actors, the most sensitive assets, the main vulnerabilities, and several strategic risks. more

More Than 500 Schools in the U.S. Hit by Ransomware in 2019, Says Report

A recent report published by the cybersecurity firm Armor says ransomware infections have hit over 500 US schools in 2019 to date. Armor warns the rate of attack seems to be picking up with 15 new ransomware victims in the last two weeks, all of them educational institutions. more

US Court Upholds FCC's Net Neutrality Repeal But Says States Can't Be Barred from Passing Own Rules

A U.S. court decision today determined net neutrality laws could return at the state level overruling Trump administration's effort to block states from passing their own net neutrality laws. more

The U.S. House Judiciary Committee Is Investigating Google's Plans to Implement DNS Over HTTPS

The U.S. House Judiciary Committee is investigating Google's plans to implement DNS over HTTPS (DoH) in Chrome according to a report by the Wall Street Journal over the weekend. more

27 Countries Issue Joint Statement on 'Advancing Responsible State Behavior in Cyberspace'

The joint statement was released on Monday at the United Nations ahead of the UN General Assembly's General Debate calling on all states to support the evolving framework and to join in ensuring "greater accountability and stability in cyberspace." more

Cyber Risk Now on Top of Corporate Risk Agendas, Cyber Insurance Expanding

Results from the 2019 Marsh-Microsoft Global Cyber Risk Perception survey indicates several encouraging signs of improvement in the way organizations view and manage cyber risk. more

Most Read – Last 30 Days

Recent Comments

Doing Our Part for a Safer, Stronger DNS
Domain Enforcement in a Post-GDPR World
Domain Enforcement in a Post-GDPR World
Domain Enforcement in a Post-GDPR World
Domain Enforcement in a Post-GDPR World
Domain Enforcement in a Post-GDPR World
Domain Enforcement in a Post-GDPR World
Celebrating Twenty Years of the UDRP
The Myth of 5G and Driverless Cars

Topics

Whois

Sponsored byWhoisXML API

New TLDs

Sponsored byAfilias

DNS Security

Sponsored byAfilias

Domain Names

Sponsored byVerisign

Cybercrime

Sponsored byThreat Intelligence Platform

Cybersecurity

Sponsored byVerisign

IP Addressing

Sponsored byAvenue4 LLC

Industry Updates

Do Security Service Providers Need Their Own Data Scientists?

WhoisXML API In a world where society is driven by information, data science has gained solid ground over the past years for its ability to separate the wheat from the chaff. Its predictive power is now being explored in the context of cybersecurity. After all, efficient threat protection requires gathering and interpreting the enormous amounts of traffic generated to and from one's network. more

SOAR Versus SIEM: The Fundamental Differences

WhoisXML API Security orchestration, automation, and response (SOAR) and security information and event management (SIEM) tools share several components and so most security operations teams use the terms interchangeably. more

Being Cybersecure Is Not Enough, Become Cyber-Resilient Instead

WhoisXML API Technology, for its immense evolution, has now become a significant driver of the economy – both digital and global. Along with developments and innovations such as cloud-based computing and Internet-connected mobile devices, however, cybercrime lurks in the shadows. more

Is Your Organization Mature Enough for Security Orchestration, Automation, and Response?

Threat Intelligence Platform (TIP) We are currently seeing a trend toward the adoption of security orchestration, automation, and response (SOAR) tools that shouldn't waver in the coming years. Research firm Gartner who coined the term has predicted that by the end of 2022 30% of organizations with security teams larger than five people will make SOAR tools part of their operations. more

Can Security Analytics Combat Digital Fraud with IP and Domain Name Monitoring?

WhoisXML API For several years, digital security relied on a simple strategy – gain insight from past events, learn from them, and base security protection accordingly. more

Afilias Endorses Global Commission on the Stability of Cyberspace Final Report at Paris Peace Forum

Afilias The Global Commission on the Stability of Cyberspace (GCSC) has presented its "Advancing Cyberstability" report at the Paris Peace Forum. The report is the culmination of the Commission's multi-stakeholder efforts over the past three years to offer – at a critical juncture in the future of cyberspace – a framework for cyber stability, norms of cyber-behavior for state and non-state actors, and recommendations for enhancing stability. more

Alleviating the Constant Clash Between DevSecOps and DevOps Teams

WhoisXML API One of the main struggles of organizations is streamlining processes through cost-effective means. This problem is adequately addressed by DevOps, a set of processes that aims to unify development and operations. more

Moving from the Castle-and-Moat to the Zero-Trust Model

WhoisXML API The traditional notion of the security perimeter is growing increasingly problematic in the wake of highly publicized attacks. The perimeter is becoming nonexistent, as cloud-based infrastructures replace legacy systems. more

What to Look for in Digital Forensics and Incident Response Experts

WhoisXML API While it's true that the lines between cybersecurity roles have become blurred, some have more significant barriers to entry. The field of digital forensics and incident response (DFIR), in particular, is an altogether different beast. more

Why IT Security and DevOps Teams Are Often at Odds

WhoisXML API Achieving an ideal organizational network means seamless development, operations, and security. Knowing and achieving that, however, is a great challenge. more

Mitigation and Remediation: Where Threat Intelligence Fits In

WhoisXML API Mitigation and remediation are two words thrown around a lot in cybersecurity, often, interchangeably. While there exists a stark contrast between one and the other, both play a crucial role in security service providers' risk-related decisions. more

.club and Neustar – Partnering for Success

Neustar Following a recent contract renewal, Neustar and .CLUB Domains are happy to announce a four-year extension of our longstanding, successful partnership. This means Neustar will remain the exclusive Registry Service Provider for the .CLUB TLD until at least 2023. more

4 Cybersecurity Jobs Created in Response to Evolving Threats

WhoisXML API Emerging malicious threats are driving the demand for new cybersecurity experts. The rise of ransomware and machine learning (ML)-driven attacks underscores the importance of having the capability to track and prepare to combat such threats. In response, the profession had to adapt quickly by employing staff with the necessary offensive and defensive skills. more

Cloud and IaaS DLP Woes: Is Additional Threat Intelligence a Solution?

Threat Intelligence Platform (TIP) Cloud-based technologies are effective means to gain visibility into the IT challenges faced by organizations. Adopting them enabled infrastructure-as-a-service (IaaS) providers to increase client uptime, security, and compliance, all the while giving more flexibility to scale up or down to respond to opportunities and challenges on time. more

Carpet-Bombing Attacks: A Rising Threat to ISPs

WhoisXML API News of a South African ISP's two-day outage sent the industry abuzz last month, highlighting the need for improved distributed denial-of-service (DDoS) attack mitigation. more

How Threat Intelligence Prevents Nameserver Takeovers and Their Far-Reaching Damage

WhoisXML API In an ideal world, administrators should never run across threats to their web properties. However, human errors and vulnerabilities inevitably get in the way of cybersafety. Managed Domain Name System (DNS) providers, registrars, and services can sometimes put users at immense risk as well. more

Can Network and Threat Data Correlation Improve SIEM Solutions?

Threat Intelligence Platform (TIP) More and more businesses contend with rising cybersecurity threats. The mounting numbers are pressuring managed service providers (MSPs) to employ sophisticated tools to secure each of their client's systems, network architectures, and confidential information. more

Leading Voices  –  From our corporate sponsors

Paul Livesay VP and Counsel at Verisign 1 post viewed 12,739 times
Shumon Huque Principal Research Scientist at Verisign Labs 1 post viewed 15,413 times
Roland LaPlante Senior Vice President and Chief Marketing Officer at Afilias 17 posts viewed 215,314 times
Jonathan Robinson Executive Chairman at Afilias 1 post viewed 8,615 times
Duane Wessels Distinguished Engineer at Verisign 6 posts viewed 63,834 times
Chuck Gomes VP of Policy and Compliance, Naming and Directory Services at VeriSign 2 posts viewed 25,117 times
Burt Kaliski Chief Technology Officer at Verisign 19 posts viewed 185,313 times
John Kane Vice President of Corporate Services, Afilias 4 posts viewed 55,161 times
Danny McPherson Executive Vice President and Chief Security Officer at Verisign 12 posts viewed 142,361 times
Dr. James Galvin Director, Technical Standards at Afilias 3 posts viewed 45,666 times
Marc Lindsey President and Co-founder at Avenue4 LLC 5 posts viewed 35,512 times
Janine Goodman Vice President and Co-founder at Avenue4 LLC 6 posts viewed 46,983 times
Ram Mohan Executive Vice President & CTO, Afilias 33 posts viewed 592,267 times
Scott Hollenbeck Senior Director of the Verisign Registry Services Lab 12 posts viewed 139,541 times
Keith Drazek Vice President, Public Policy & Government Relations at Verisign 2 posts viewed 19,479 times