Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

IPv6 Security Myth #3: No IPv6 NAT Means Less Security

We're back again with part 3 in this 10 part series that seeks to bust 10 of the most common IPv6 security myths. Today's myth is a doozy. This is the only myth on our list that I have seen folks raise their voices over. For whatever reason, Network Address Translation (NAT) seems to be a polarizing force in the networking world. It also plays a role in differentiating IPv4 from IPv6. more»

Ensuring Trust in Internet Governance

This week in Singapore, important decisions are being made about the future of the Internet at the Internet Corporation for Assigned Names and Numbers (ICANN) 52 conference. At stake are fundamental questions: Should the American people surrender stewardship over core technical functions that have preserved the open and neutral operation of the Internet since its inception? Should the Obama Administration cede this authority to an organization many consider to be non-transparent, unaccountable and insular? more»

Domain Names Overcoming Awareness Gap in Mainstream Media

One of the challenges faced by registries that are launching is that there is a large lack awareness of the new options being available -- to browse as internet users or to register a domain. In a recent survey conducted by the Domain Name Association, (TheDNA) (of which I am a member), people of varying aptitude and experience from the general population of 10 different countries were provided a series of questions about their browsing habits. more»

IPv6 Security Myth #4: IPv6 Networks are Too Big to Scan

Here we are, all the way up to Myth #4! That makes this the 4th installment of our 10 part series on the top IPv6 Security Myths. This myth is one of my favorite myths to bust when speaking with folks around the world. The reason for that is how many otherwise well-informed and highly experienced engineers, and others, hold this myth as truth. It's understandable, really. more»

We're Asking the Wrong Questions

In my role as CMO of .CLUB I get to speak about domain names at different events all over the world, and have been doing so for more than two years now. From stages and podiums at countless events I have heard the same comments and questions again and again, and in all that time it seems that very little has changed when it comes to the perceptions of the new domain extensions, the so-called "new gTLDs"... more»

Four TLDs to Watch in 2015

The Internet's expansion is well underway. Just three years ago, nearly every web address ended in either .com, .net, .gov, or .edu. Fast forward to today where the number of Internet suffixes, or top-level domains (TLDs), is soon to exceed one thousand. In an instant, the Internet went from overcrowded to potential overexpansion. The question brand owners are asking themselves is -- which TLDs are worth claiming a web address on? And what tools are out there to help monitor domain name registrations in these new TLDs? more»

IPv6 Security Myth #5: Privacy Addresses Fix Everything!

Internet Protocol addresses fill two unique roles. They are both identifiers and locators. They both tell us which interface is which (identity) and tell us how to find that interface (location), through routing. In the last myth, about network scanning, we focused mainly on threats to IPv6 addresses as locators. That is, how to locate IPv6 nodes for exploitation. Today's myth also deals with IPv6 addresses as identifiers. more»

Notes from NANOG 63

The following is a selected summary of the recent NANOG 63 meeting, held in early February, with some personal views and opinions thrown in! ...One view of the IETF's positioning is that as a technology standardisation venue, the immediate circle of engagement in IETF activities is the producers of equipment and applications, and the common objective is interoperability. more»

IPv6 Security Myth #6: IPv6 is Too New to be Attacked

Here we are, half-way through this list of the top 10 IPv6 security myths! Welcome to myth #6. Since IPv6 is just now being deployed at any real scale on true production networks, some may think that the attackers have yet to catch up. As we learned in Myth #2, IPv6 was actually designed starting 15-20 years ago. While it didn't see widespread commercial adoption until the last several years, there has been plenty of time to develop at least a couple suites of test/attack tools. more»

The True Faith of Internet Governance: Statism Finds Its Champion

A portion of me sympathizes with Richard Hill. He argues passionately in his recent article, "The True Stakes of Internet Governance" for a statist position on Internet governance. It is hard to be an unheeded prophet; difficult to take positions that are not in the comfortable mainstream of what, as you perceive, are lemmings heading for the cliff. I know the feeling. more»

A Cynic's View of 2015 Security Predictions - Part 4

Lastly, and certainly not the least, part four of my security predictions takes a deeper dive into mobile threats and what companies and consumer can do to protect themselves. If there is one particular threat category that has been repeatedly singled out for the next great wave of threats, it has to be the mobile platform -- in particular, smartphones... The general consensus of prediction was that we're (once again) on the cusp of a pandemic threat. more»

Phishing Costs Companies over $411 Million per Alert

Phishing blindsides businesses' best defenses and takes a toll whose price tag still hasn't been pinned down. Here's one estimate: $441 million per attack, according to a recent study of the cybercrime's effect on stock market data (market value, volume of shares traded, and stock volatility) of global firms. The authors use "event studies" techniques (i.e., analyzing the impact of specific types of events on companies' market performance) to analyze nearly 2,000 phishing alerts by 259 companies in 32 countries... more»

.cancerresearch - Can a New TLD Beat a Global Disease?

I wish cancer research didn't exist. Imagine a world without cancer, where a cure existed to eradicate this disease. Today, the best way for us to achieve this is through cancer research, and extremely bold goals like this require game-changing innovation. Fittingly, the .cancerresearch Top Level Domain will launch on World Cancer Day (February 4) and use this fantastic new digital platform to show that cancer, its treatments and its cures, are not beyond us. more»

A Cynic's View of 2015 Security Predictions - Part 3

A number of security predictions have been doing the rounds over the last few weeks, so I decided to put pen to paper and write a list of my own. However, I have a quite a few predictions so I have listed them over several blog posts. After all, I didn't want to bombard you with too much information in one go! Part three examines the threats associated with data breaches. more»

The IG Marathon, Who Will Win the Internet Governance Race

2015 has already started to make its own land marks in the internet of things world. A major thing that has definitely hit the headlines is cyber security issue, which gives an indication that organizations will probably have to make generous budgetary allocations to answer to these anticipated breaches. Internet governance is perhaps going to remain in the headlines for the rest of 2015. more»

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Sponsored Topics

Verisign

Security

Sponsored by
Verisign
dotMobi

Mobile

Sponsored by
dotMobi
Afilias

DNS Security

Sponsored by
Afilias
Minds + Machines

Top-Level Domains

Sponsored by
Minds + Machines