Hot Topics:   Policy & Regulation    Cybersecurity    Internet Governance    Domain Names    ICANN    Wireless    Access Providers   

Featured Blogs

A Closer Look at the "Sovereign Runet" Law

Ilona Stadnik In December 2018, a bill on the "stable operation" of the Russian segment of the Internet was introduced and got the title "Sovereign Runet" in mass media and among the public. It was adopted after 5 months later, despite doubts about the technical feasibility of its implementation. The law is very ambitious in its intent to simultaneously control Internet traffic and protect Runet from some external threats, but legislators still have no idea how it would actually work. more

SpaceX Reports Significant Broadband Satellite Progress

Larry Press SpaceX delayed last Wednesdays Starlink launch due to high winds and on Thursday they decided to do a software update and postpone the launch until next week, but they revealed significant progress in their Starlink mission press release and in tweets by and a media call with Elon Musk. The mission press release said SpaceX has significantly reduced the size and weight of their satellites. more

A Report on the ICANN DNS Symposium

Geoff Huston By any metric, the queries and responses that take place in the DNS are highly informative of the Internet and its use. But perhaps the level of interdependencies in this space is richer than we might think. When the IETF considered a proposal to explicitly withhold certain top-level domains from delegation in the DNS the ensuing discussion highlighted the distinction between the domain name system as a structured space of names and the domain name system as a resolution space... more

Know Someone Who Has Made the Internet Better? Postel Service Award Nominations Deadline May 15

Dan York Do you know of someone who has made the Internet better in some way who deserves more recognition? Maybe someone who has helped extend Internet access to a large region? Or wrote widely-used programs that make the Internet more secure? Or maybe someone who has been actively working for open standards and open processes for the Internet? more

Gall's Law and the Network

Russ White In Systemantics: How Systems Really Work and How They Fail, John Gall says: "A complex system that works is invariably found to have evolved from a simple system that worked. A complex system designed from scratch never works and cannot be patched up to make it work. You have to start over with a working simple system." In the software development world, this is called Gall's Law... more

How Do You Know if You're Choosing the Best IP Geolocation API?

Jonathan Zhang If you can't address your customers and the people interacting with your network face to face, at least know where they are -- anywhere in the world, anytime you want to. That's possible with geolocation technology, and many businesses are keen on acquiring the best IP geolocation API for cybersecurity and other purposes. However, before committing to a particular solution, each product needs to be carefully evaluated according to the exact needs of a prospective buyer. more

Satellite Internet Service Progress by SpaceX and Telesat

Larry Press This has been a busy week in the race to deploy constellations of low-earth orbit (LEO) Internet-service satellites. In their quarterly report, Telesat mentioned progress in two, disparate markets. As I noted earlier, they have signed their first LEO customer - Omniaccess a provider of connectivity to the superyacht market. more

Efficient Threat Intelligence: Learning the Secrets

Jonathan Zhang How can our threat intelligence platform deliver more? This is a question many business professionals employing threat intelligence practices are asking themselves as their companies continue to fall short against the machinations of modern-day cybercriminals. The truth is that while threat intelligence is certainly not a silver bullet, organizations often make a mistake when they opt for a platform without considering several important factors that can help them evaluate the market better and deploy the practice more effectively. more

Understanding 5G: A Basic Primer

Anthony Rutkowski The initial, essential step toward understanding 5G is to perform an intellectual body purge of the endless disgorging of cluelessness and disinformation that emerges from the Washington White House and radiates out around that city and then to the outside world that it infects. The institutes, pundits, self-professed experts, summits, and even the U.S. press all pretty much feed out of the same trough of 5G political slop that gets passed around as incantations of ignorance, spin, and K-street lobbying. more

UDRP Complaint: Actually, a Motion for Summary Judgment

Gerald M. Levine Trademark owners (and here I'm talking about those with U.S. registrations even if they are foreign entities) have a choice of forum for challenging alleged cybersquatting domain names. They can either sue in district court under the ACPA, or get a quicker and less expensive result by filing a complaint and asserting a claim under the UDRP. But to get to a quicker and less expensive result everything about the process is accelerated, and this begins with drafting the complaint. more

What Is the Business Case for 5G?

Paul Budde There is much hype around 5G, but none of it is new. We saw the same propaganda -- fueled by the manufacturers -- in the run-up to the launch of the 3G and 4G versions of the mobile technology. Driverless cars and a range of other IoT applications can indeed potentially open new revenue streams. The reality, however, is that these markets might not eventuate until somewhere between 2025 and 2030. more

Greater Caribbean Cooperation Needed to Combat Cyber Crimes

Gerard Best The Caribbean is under virtual siege as incidents of cyber attacks and cyber crimes surge across the region. "The sophisticated use of technology by highly incentivised criminal organisations has created unprecedented opportunities for transnational crime elements that no one region, country or entity can fight on its own. More inter-regional cooperation and collaboration are needed to develop and implement smart and integrated approaches to fight new and emerging cyber threats." more

The Borg in Us All: Is Resistance Futile?

Klaus Stoll One of the main roles played by science fiction is to portray fundamental issues and questions that face humanity long before they actually become relevant to our daily lives. We cannot always be sure of where our reality ends, and fiction begins. Star Trek storylines including Borgs are a good example. In the storyline, Borgs are part organic, part artificial and created eons ago, yet they seem to presage the challenges in our contemporary personal reality and challenges in the Internet's cyberspace. more

Spamtraps Are Overblown… by Senders

Laura Atkins One of the fascinating parts of my job is seeing how different groups in email have radically disparate points of view. A current example is how much value senders put on spamtraps compared to ISPs and filtering companies. I understand why this is. In all too many cases, when a sender asks why they're mail is going to bulk or being blocked, the answer is "you're hitting spamtraps." The thing is, spamtraps are almost never the only reason mail is being blocked. more

Experts Call for Caribbean to Make Its Voice Heard on Global Internet Governance

Gerard Best The internet has come to play a vital role in the social and economic development of the Caribbean. Yet, countries in the region are, in the main, relying heavily on external interests to make important decisions about the technical specifications and security of the technology and rules that impact how the Internet is governed. "We find that the Caribbean governments are abdicating their seats at the table in global fora where major decisions are made regarding the future of the Internet. more

News Briefs

Two Years Later WannaCry Continues to Spread to Vulnerable Devices, Nearly 5M Devices Affected

Two years after the initial wave of WannaCry attack in May of 2017, security researchers say the ransomware continues to spread to vulnerable devices. WannaCry infection has affected close to 5 million devices to date. more

WordPress Parent Company Automattic, and .Blog Operator Switches Registry From Nominet to CentralNic

The operator of .blog top-level domain, Knock Knock WHOIS There, LLC, which is a subsidiary of Automattic, the parent company of WordPress.com and Jetpack, announced on Wednesday that it is "moving into the next phase of .blog." more

Close to 735K Fraudulently Obtained IP Addresses Have Been Uncovered and Revoked, ARIN Reveals

The American Registry for Internet Numbers, Ltd. (ARIN) has won a legal case against an elaborate multi-year scheme to defraud the Internet community of approximately 735,000 IPv4 addresses, the organization has revealed. While the specifics of the findings are not released, John Curran, ARIN President and CEO said the fraud was detected as a result of an internal due diligence process. more

Huawei Says They Are Willing to Sign No-Spy Agreements With Governments

During a London conference, Huawei's chairman Liang Hua told reporters the company would sign no-spy agreements with governments as a response to United States' pressure on Europe to bar the Chinese telecommunications company over spying concerns. more

National Telecommunications and Information Administration (NTIA) Chief David Redl Resigns

David Redl, head of U.S. Commerce Department's National Telecommunications and Information Administration (NTIA) resigned abruptly from his position on Thursday. more

US Federal Trade Commission Says It Lacks Resources to Go After Privacy Violations Effectively

At hearing on Wednesday, the U.S. Federal Trade Commission (FTC) urged Congress to pass data privacy legislation and enhance its authority to police large tech companies. more

Israel’s Airstrike on Hamas Hackers: First Real-Time Physical Retaliation Against Cyberattack

Amid escalating violence between Israel and Gaza this weekend, the Israeli Defense Force claimed it bombed and partially destroyed the base of an active Hamas hacking group in Gaza. more

We Will Not Raise Prices Unreasonably, Says .ORG Operator

The operator of the .ORG top-level domain, Public Interest Registry (PIR), issued a statement assuring its community of registrants that it "not raise prices unreasonably." Also, it has no specific plans for any price increases. more

American Households Estimated to Save Over $30 Billion a Year on Broadband With LEO Satellites

Low Earth Orbit (LEO) satellites are still in their infancy, but according to one analysis, the technology could save American households more than $30 billion per year by intensifying broadband competition more

Representatives From EU, NATO, USA, Japan, Australia Hold Meeting on 5G Security and Policy Measures

Representatives from over 30 countries including nations from European Union, NATO, United States, Germany, Japan, Israel and Australia participated in the Prague 5G Security Conference this week. more

No GDPR Action Against Any Big Tech Firms Since Law Imposed Last Year, Doubts Escalate Over Enforcer

Last year Europe imposed GDPR, arguably the world's toughest standard for data privacy and now, a year later, there has yet to be any enforcement action against a big tech firm. more

Vladimir Putin Signs 'Sovereign Internet' Law to Further Tighten Government Control of the Internet

President Vladimir Putin on Wednesday signed an "internet sovereignty" bill into law that further expands government's control of the Internet. more

UK Government Planning on New Laws for IoT Devices Including a Mandatory Security Labelling Scheme

The UK government on Wednesday announced plans to introduce new laws for internet connected devices to better enforce the inclusion of basic cybersecurity features into IoT devices. more

Canada Says Facebook Has Refused to Address Serious Privacy Deficiencies Concerning Its Local Laws

The Canadian government released a statement saying "Facebook committed serious contraventions of Canadian privacy laws and failed to take responsibility for protecting the personal information of Canadians." more

Hackers in Possession of Over 312K Files, 516GB Financial Data of Some of World's Largest Companies

A report broke today revealing hackers have successfully breached a German internet infrastructure firm that provides services to several large companies, including Ericsson, Leica, Toshiba, UniCredit, British Telecom, Hugo Boss, NH Hotel Group, Oracle, Airbus, Porsche, and Volkswagen. more

World's Growing Refugee Population Requires Access to Broadband to Mitigate Problems, Says Report

Many of the problems refugees and their host countries face can be mitigated and made easier to solve if internet connectivity gaps are closed, says a team of senior communications experts working with UN High Commissioner for Refugees (UNHCR). more

Non-Profit Organizations Send Joint Letter to ICANN Opposing the Removal of .org Price Caps

In a joint letter sent to ICANN on Monday, a group of non-profit organizations has opposed the removal of price caps in the .org Registry Agreement. more

Britain to Involve Huwawei in Nation's 5G Rollout Amid US Ban

Top British officials have given the green light to the Chinese technology giant Huawei to participate in the development of the 5G wireless network in the United Kingdom, reports the Washington Post. more

Mueller Report: Russians Used Spear Phishing, SQL Injection to Penetrate US Election Administration

The nearly 400-page copy of the Mueller report released on Thursday includes some details on how Russia's foreign military intelligence agency (GRU), targetted individuals and entities involved in the administration of the U.S. elections. more

FCC to Block China Mobile From Gaining Access to the U.S. Market

Federal Communications Commission Chairman Ajit Pai has opposed China Mobile's Application to provide telecom services in the United States. more

Most Read – Last 30 Days

Recent Comments

A Report on the ICANN DNS Symposium
A Report on the ICANN DNS Symposium
Gall's Law and the Network
A Short History of DNS Over HTTP (So Far)
Understanding 5G: A Basic Primer

Topics

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

DNS Security

Sponsored byAfilias

IP Addressing

Sponsored byAvenue4 LLC

New TLDs

Sponsored byAfilias

Industry Updates

Radix's Karn Jajoo Talks GDPR Benefits, Positive Outlook of New gTLDs and Radix's Impressive Growth

Radix In a recent interview with Karn Jajoo, Head of Premium Portfolio at Radix, he discusses Radix's impressive growth in 2018, the positive impact of the EU's GDPR has been it's spawned privacy discussions in developing countries with local data privacy laws and more. more

The Era of Malware: 3 Techniques to Detect and Stay Protected

WhoisXML API A while back, creating malicious software was sort of a hobby for programmers. It was hardly ever used to make money, but more of a way to show off what one can do with a computer. more

Domain Reputation API: Scoring High Points for Deliverability and Security

WhoisXML API As scary as it may seem, everyone is a target on the Web. Worse, your susceptibility to cyber attacks, when not promptly addressed, marks you not just as a target but can even lead others to consider you as a threat. more

Neustar Research Shows Large Attacks Growing as Multi-Vector Exploits Increasingly Become the Norm

Neustar Neustar has released its Q1, 2019 Cyber Threats and Trends report which highlights new areas of growth in Distributed Denial of Service (DDoS) attacks over the past year. The report affirms that DDoS attacks continue to be an effective means to distract and confuse security teams while inflicting serious damage to brands. more

Currents of Change: Empowering the Growth and Interplay of Subsea and Interconnection

DE-CIX At the moment, the ecosystem of global interconnection and the worldwide web of subsea cables are experiencing a concurrent and dynamic expansion, making waves across the globe and generating a new era of diversified routes and developing nodes. more

4 Professions Leveraging WHOIS to Stay Ahead

WhoisXML API Who are the entities behind the domains on the Web? This question has nothing to do with stalking but is critical for various business activities. Domainers, for instance, want this information to negotiate lucrative purchases while journalists might need it to set up interviews or get leads during investigations. more

A Quick Guide to Understanding IP Geolocation API

WhoisXML API Do you know where your online customers are? Can you tell whether the right users in your network are all authorized to access its content? Are you able to detect and block suspicious traffic and devices? more

A Snapshot of the Fundamentals of Threat Hunting

WhoisXML API Like it or not but the face of cybersecurity has changed over the past few years and while conventional approach has taken a back seat lately, non-traditional methods are coming to the rescue. more

Verisign Q4 2018 Domain Name Industry Brief: Internet Grows to 348.7 Million Domains in Q4 of 2018

Verisign Verisign released the latest issue of the Domain Name Industry Brief showing the fourth quarter of 2018 closed with approximately 348.7 million domain name registrations across all top-level domains (TLDs) - an increase of approximately 6.3 million domain name registrations, or 1.8 percent, compared to the third quarter of 2018. more

Avenue4 Releases 2018 State of the IPv4 Market Report

Avenue4 LLC Escalating prices for large IPv4 number blocks, coupled with aggressive buyer acquisition strategies throughout 2018, stimulated considerable additional supply, according to the 2018 State of the IPv4 Market Report released by Avenue4 LLC. more

Ethiopia Has Officially Launched Its .ET Domain in Partnership With ZDNS

ZDNS Ethio Telecom, the telecommunication services provider of Ethiopia and the Registry operator of .ET has launched the country code Top-Level Domain (ccTLD) for Ethiopia. .ET domain is supported by the registry system developed by ZDNS, a leading internet infrastructure service provider from China. more

Leading Voices  –  From our corporate sponsors

Shumon Huque Principal Research Scientist at Verisign Labs 1 post viewed 14,477 times
Burt Kaliski Chief Technology Officer at Verisign 19 posts viewed 172,813 times
John Kane Vice President of Corporate Services, Afilias 4 posts viewed 52,432 times
Scott Hollenbeck Senior Director of the Verisign Registry Services Lab 12 posts viewed 130,731 times
Ram Mohan Executive Vice President & CTO, Afilias 33 posts viewed 563,287 times
Danny McPherson Executive Vice President and Chief Security Officer at Verisign 12 posts viewed 134,402 times
Paul Livesay VP and Counsel at Verisign 1 post viewed 11,355 times
Keith Drazek Vice President, Public Policy & Government Relations at Verisign 2 posts viewed 18,225 times
Jonathan Robinson Executive Chairman at Afilias 1 post viewed 7,920 times
Chuck Gomes VP of Policy and Compliance, Naming and Directory Services at VeriSign 2 posts viewed 23,669 times
Dr. James Galvin Director, Technical Standards at Afilias 3 posts viewed 42,882 times
Marc Lindsey President and Co-founder at Avenue4 LLC 5 posts viewed 31,521 times
Roland LaPlante Senior Vice President and Chief Marketing Officer at Afilias 17 posts viewed 202,886 times
Duane Wessels Distinguished Engineer at Verisign 6 posts viewed 58,382 times
Janine Goodman Vice President and Co-founder at Avenue4 LLC 5 posts viewed 35,724 times