Hot Topics:   Security    Policy & Regulation    Law    Domain Names    Cyberattack    Internet Governance    Cybercrime    more...

Featured Blogs

Differing UDRP Decisions Show That Facts Matter

Doug Isenberg "Past performance does not necessarily predict future results." That's what the U.S. Securities and Exchange Commission requires mutual funds tell investors. But it's also true about domain name disputes. Cases in point: In four recent proceedings under the Uniform Domain Name Dispute Resolution Policy (UDRP), the operator of a large bank won two decisions but lost two others, despite a track record of having won more than 30 previous UDRP disputes. more»

Help Us Answer: What Will the Internet Look Like in 10 Years?

Sally Shipman Wentworth What will the Internet look like in the next seven to 10 years? How will things like marketplace consolidation, changes to regulation, increases in cybercrime or the widespread deployment of the Internet of Things impact the Internet, its users and society? At the Internet Society, we are always thinking about what's next for the Internet. And now we want your help! more»

If Slate Comes in Standard Sizes, Why Not Broadband?

Martin Geddes Last week I was at the National Slate Museum in Wales watching slate being split apart. On the wall were sample pieces of all the standard sizes. These have cute names like "princess". For each size, there were three standard qualities: the thinnest are the highest quality (at 5mm in thickness), and the thickest have the lowest quality (those of 13mm or more). Obviously, a lighter slate costs less to transport and lets you roof a wider span and with less supporting wood, hence is worth more. more»

Cyber-Terrorism Rising, Existing Cyber-Security Strategies Failing, What Are Decision Makers to Do?

Khaled Fattal While conventional cyber attacks are evolving at breakneck speed, the world is witnessing the rise of a new generation of political, ideological, religious, terror and destruction motivated "Poli-Cyber™" threats. These are attacks perpetrated or inspired by extremists' groups such as ISIS/Daesh, rogue states, national intelligence services and their proxies. They are breaching organizations and governments daily, and no one is immune. more»

How a 'Defensive Registration' Can Defeat a UDRP Complaint

Doug Isenberg A company that registers a domain name containing someone else's trademark may be engaging in the acceptable practice of "defensive registration" if (among other things) the domain name is a typographical variation of the registrant's own trademark. That's the outcome of a recent decision under the Uniform Domain Name Dispute Resolution Policy (UDRP), a case in which the domain name in dispute, idocler.com, contained the complainant's DOCLER trademark -- but also contained a typo of the respondent's DOLCER trademark. more»

Zero-Touch Provisioning… Really?

Ronan Bracken Zero-touch provisioning (ZTP) -- whatever does that mean? Of course, it is another marketing term. I think the term "closer to zero touch provisioning" is probably better, but CTZTP -- as opposed to ZTP -- is a bit more of a mouthful. Whenever I hear language like this that I'm not familiar with, I get struck by a bolt of curiosity. What is this new and shiny phrase that has just appeared as if from nowhere? more»

History is Written and Revised by the Winners - Can the Internet Archive Change That?

Larry Press I was naively optimistic in the early days of the Internet, assuming that it would enhance democracy while providing "big data" for historians. My first taste of that came during the Soviet coup attempt of 1991 when I worked with colleagues to create an archive of the network traffic in, out and within the Soviet Union. That traffic flowed through a computer called "Kremvax," operated by RELCOM, a Russian software company. The content of that archive was not generated by the government or the establishment media -- it was citizen journalism... more»

Fairness & Due Process Require Changes to ICANN's "Updated Supplementary Procedures" to the IRP

Kathy Kleiman The Updated Supplementary Procedures for Independent Review Process ("IRP Supplementary Procedures") are now up for review and Public Comment. Frankly, there is a lot of work to be done. If you have ever been in a String Objection, Community Objection, or negotiated a Consensus Policy, your rights are being limited by the current way the IRP Supplementary Procedures proposal is structured. With timely edits, we can ensure that all directly-impacted and materially-affected parties have actual notice of the IRP proceeding... more»

Should You Pay Ransomware Demands?

Rachel Gillevet Ransomware is a huge problem for small and medium businesses, and the most important question is this: should you pay the ransom? Ransomware has proven a successful revenue generator for criminals, which means the risk to businesses will grow as ransomware becomes more sophisticated and increasing numbers of ethically challenged criminals jump on the bandwagon. more»

New Report on "State of DNSSEC Deployment 2016" Shows Continued Growth

Dan York Did you know that over 50% of .CZ domains are now signed with DNS Security Extensions (DNSSEC)? Or that over 2.5 million .NL domains and almost 1 million .BR domains are now DNSSEC-signed? Were you aware that around 80% of DNS clients are now requesting DNSSEC signatures in their DNS queries? And did you know that over 100,000 email domains are using DNSSEC and DANE to enable secure email between servers? more»

How a Plaintiff Was Undeceived and Lost at Spam Litigation - What Nobody Told You About!

Robert Cannon Back in 2003, there was a race to pass spam legislation. California was on the verge of passing legislation that marketers disdained. Thus marketers pressed for federal spam legislation which would preempt state spam legislation. The Can Spam Act of 2003 did just that... mostly. "Mostly" is where litigation lives. According to the Can Spam Act preemption-exception... more»

CircleID's Top 10 Posts of 2016

The new year is upon us and it's time for our annual look at CircleID's most popular posts of the past year and highlighting those that received the most attention. Congratulations to all the 2016 participants and best wishes to all in the new year. more»

Internet Governance Outlook 2017: Nationalistic Hierarchies vs. Multistakeholder Networks?

Wolfgang Kleinwächter Two events, which made headlines in the digital world in 2016, will probably frame the Internet Governance Agenda for 2017. October 1, 2016, the US government confirmed the IANA Stewardship transition to the global multistakeholder community. November 2, 2016, the Chinese government announced the adoption of a new cybersecurity law which will enter into force on July 1, 2017. more»

Parsing Domain Names Composed of Random Letters for Proof of Cybersquatting

Gerald M. Levine The Respondent's cry of pain in AXA SA v. Whois Privacy Protection Service, Inc. / Ugurcan Bulut, axathemes, D2016-1483 (WIPO December 12, 2016) "[w]hat do you want from me people? I already removed all the files from that domain and it's empty. What else do you want me to do???" raises some interesting questions. "A," "x," and "a" is an unusual string of letters but unlike other iconic strings such as "u," "b" and "s" and "i", "b" and "m" for example that started their lives as the first letters of three-word brands AXA is not an acronym. more»

Is Proprietary Dead?

Russ White A new age of openness is coming upon us. At least that's what we're being told. For instance -- "The reign of closed solution suites is over, shifting to the rise of open, heterogeneous software ecosystems." Maybe it's my 30 years in the information technology business (how many people remember Thomas-Conrad ARCnet hardware?), but I'm not convinced. It's worth taking a moment to consider the case. more»

News Briefs

Trump Expected to Name FCC Commissioner Ajit Pai as Chairman

"Pai, a Barack Obama nominee who has served as the senior FCC Republican for more than three years, could take the new role immediately and wouldn't require approval by the Senate because he was already confirmed to serve at the agency," Alex Byers and Tony Romm reporting in Politico. ›››

Outgoing FCC Chairman Warns Republicans Against Overturning Net Neutrality

"Outgoing U.S. Federal Communications Commission Chairman Tom Wheeler warned Republicans against dismantling the Obama administration's landmark 'net neutrality' protections," David Shepardson reporting in Reuters. ›››

New Study Highlights Growing Risk, Lack of Urgency with Mobile and IoT Application Security

Despite widespread concern about the security of mobile and Internet of Things (IoT) applications, organizations are ill-prepared for the risks they pose, according to a research report issued today from Ponemon Institute, IBM Security, and Arxan Technologies. ›››

Canadian Energy Firms at Bigger Risk of Cyberattack

The Canadian Security Intelligence Service (CSIS) is reported to have warned companies about an increasing risk of cyber espionage and attacks on pipelines, oil storage and shipment facilities. ›››

Ukraine's Power Outage Due to Cyberattack, Says Country's National Power Company

A power blackout in Ukraine's capital Kiev last month was caused by a cyber attack, according to Ukraine's National power company, Ukrenergo which hired investigators to help it determining the cause. ›››

Former New York City Mayor Rudy Guliani Appointed to "Chair" Cyber Task Force

Transition spokesman Sean Spicer told reporters today that former New York City Mayo, Rudy Giuliani will "chair" the cyber task force that Trump announced last Friday. The task force is given three months from Trump's inauguration to deliver a cybersecurity plan. ›››

U.S. Department of Commerce Issues IoT Advancement Guidelines

The Department of Commerce issues a green paper outlining guiding principles and ways to support the advancement of the Internet of Things (IoT). ›››

Alphabet Shuts Down Its Solar-Powered Internet Drone Program

"Alphabet cuts former Titan drone program from X division, employees dispersing to other units," reports Seth Weintraub today in 9TO5Google. ›››

Ransomware Crime Bill Goes into Effect in the State of California

As of January 1, the delivery of ransomware is illegal in California as per Senate Bill 1137 going into effect. ›››

FTC Announces Internet of Things Challenge, Offers $25,000 for Best Technical Solution

The Federal Trade Commission is challenging the public to create an innovative tool to help protect consumers from security vulnerabilities in the software of home devices connected to the Internet of Things. ›››

Over 50 Internet Shutdowns Reported in 2016

"Governments around the world shut down the internet more than 50 times in 2016 -- suppressing elections, slowing economies and limiting free speech," Lyndal Rowlands reporting in IPS. ›››

Court Refuses Injunction in .africa TLD Case

"DotConnectAfrica's attempt to have ICANN legally blocked from delegating the .africa gTLD to rival applicant ZACR has been denied," Kevin Murphy reporting in Domain Incite. ›››

Trump Names Former Bush Aide Thomas Bossert Chief Adviser on Cybersecurity, Counterterrorism Role

President-elect Donald J. Trump has named Thomas P. Bossert, a top national security aide under President George W. Bush, to be his homeland security adviser, the Trump transition team announced Tuesday morning," Michael D. Shear reporting in the New York Times. ›››

China Says It Will Use All Means, Including Military, to Ensure Online Security

"Beijing vowed on Tuesday to use all necessary means, including military ones, to wipe out subversion and attempts to undermine its sovereignty in cyberspace," Zhuang Pinghui reporting in South China Morning Post. ›››

Tom Wheeler Announces Resignation as FCC Chairman

Federal Communications Commission Chairman Tom Wheeler has announced he will leave the agency on January 20, the day of President-elect Donald Trump's inauguration. ›››

Google Begins Publicly Sharing National Security Letters

In a note released this week, Google announced that it will begin publicly sharing National Security Letters (NSLs) it receives that have been freed of nondisclosure obligations either through litigation or legislation. ›››

China Shuts Down Thousands of Websites for 'Harmful', Obscene Content

China has shut down or 'dealt with' thousands of websites for sharing 'harmful' erotic or obscene content since April, the state's office for combating pornography and illegal publications announced on Thursday. ›››

Yahoo Reveals Over One Billion More Accounts Have Been Hacked

Just a few months after Yahoo confirmed a massive data breach impacting half a billion users, the company today disclosed a second major breach of its systems affecting over a billion users. ›››

Google Signs Internet Deal With Cuba

Google has signed an agreement with the Cuban government allowing internet users on the Communist-run island quicker access to its branded content. ›››

Internet Governance Forum Puts the Spotlight on Trade Agreements

"This year was the first year in which the spotlight fell on the use of trade agreements to make rules for the Internet behind closed doors, and a broad consensus emerged that this needs to change," Jeremy Malcolm reporting today from EFF. ›››

Popular News – Last 30 Days

Recent Comments

ICANN Fails Consumers (Again)
The Christmas Goat and IPv6 (Year 7)
Should You Pay Ransomware Demands?
ICANN Fails Consumers (Again)
ICANN Fails Consumers (Again)

Sponsored Topics

Afilias

DNS Security

Sponsored by
Afilias
Port25

Email

Sponsored by
Port25
Verisign

Security

Sponsored by
Verisign
Afilias - Mobile & Web Services

Mobile

Sponsored by
Afilias - Mobile & Web Services

Industry Updates

Michele Neylon Appointed Chair Elect of i2Coalition

i2Coalition The Internet Infrastructure Coalition (i2Coalition) announced that Blacknight CEO, Michele Neylon has been appointed Chair Elect of its Board of Directors. Mr. Neylon's position as Chair Elect became effective on January 1st, 2017 and will assume his role as Chair on January 1st, 2018. more»

Neustar to be Acquired by Private Investment Group Led by Golden Gate Capital

Neustar Neustar today announced that it has entered into a definitive agreement to be acquired by a private investment group led by Golden Gate Capital in a transaction valued at approximately $2.9 billion, including debt to be refinanced. more»

Startup League Reports from WebSummit, Lisbon

Radix Radix, the portfolio Registry behind 8+ popular extensions such as .online, .store, .tech took its latest venture, the Startup League to its first conference, WebSummit earlier this week. more»

Verisign Q3 2016 DDoS Trends Report: User Datagram Protocol (UDP) Flood Attacks Continue to Dominate

Verisign Verisign has released its Q3 2016 DDoS Trends Report providing a unique view into online distributed denial of service (DDoS) attack trends from mitigations enacted on behalf of Verisign DDoS Protection Services and research conducted by Verisign iDefense Security Intelligence Services. more»

2016 U.S. Election: An Internet Forecast

i2Coalition The unexpected election of Donald Trump, along with continued Republican control of both houses of Congress will have a big impact on our US priorities. While the outlook remains unclear, we've prepared the memo below examining the initial impact the election may have on issues that matter to Internet infrastructure companies and organizations. more»

.SPACE Becomes the Choice of the First Ever Space Nation Asgardia

Radix A group of scientists launched the first ever space nation at a press conference in Paris earlier last month.. Asgardia is the prototype of a free society in space. It aims to launch its first satellite in 2017 and be recognized by the UN. more»

Government Guidance for Email Authentication Has Arrived in USA and UK

ValiMail We recently discussed governmental organizations that send out warnings rather than preventing spear phishing attacks through email authentication. Therefore it's good to see a pair of prominent governmental organizations giving clear guidance to their constituents about using DMARC to enforce authenticity of email on their domains. The British Government Digital Service announced in June an upcoming requirement that all services using subdomains of gov.uk would need to have a DMARC policy at enforcement. more»

Afilias Chairman Jonathan Robinson Wins ICANN's 2016 Leadership Award at ICANN 57

Afilias Afilias, a leading domain registry operator, congratulates Jonathan Robinson, Executive Chairman of Afilias' Board of Directors, on receiving the Internet Corporation for Assigned Names and Numbers (ICANN) 2016 Leadership Award for his contributions to the ICANN and broader internet community. more»

ValiMail Raises $12M for Its Email Authentication Service

ValiMail The company will use the funds to meet the rapidly expanding demand for its patent-pending authentication platform which brings visibility, control, compliance, and security to cloud-based email services. more»

MarkMonitor Supports Brand Holders' Efforts Regarding .Feedback Registry

MarkMonitor In the capacity that MarkMonitor has as an ICANN accredited registrar, we have observed numerous issues with registrations in the .feedback registry. These issues date back to the initial launch of .feedback earlier this year. more»

Don't Gamble With Your DNS

Neustar When it comes to something as important as DNS, the entity responsible for keeping your website online, some companies choose to play Russian roulette with their strategy by just using one DNS provider. more»

Companies

Community  –  CircleID Participants  |  View All  |  Join CircleID

Alessandro Vesely
Tiny ISP and freelance programmerJoined on Aug 01, 2005

Brough Turner
Founder & CTO at netBlazrJoined on Apr 24, 2007

Michele Neylon
MD of Blacknight SolutionsJoined on Mar 02, 2004

Wil Tan
CTO, Cloud Registry -- innovative TLD registry back-end providerJoined on Oct 25, 2006

Michael Oghia
independent #netgov consultant & editorJoined on Sep 27, 2015

Juha Holkkola
CEO of FusionLayer, Inc.Joined on Nov 15, 2011

Martin Geddes
Founder, Martin Geddes Consulting LtdJoined on Jan 15, 2004

Jovan Kurbalija
Director of DiploFoundation & Head of Geneva Internet PlatformJoined on Apr 19, 2004

Samantha Frida
Data GeekJoined on Aug 11, 2003

Ron Aitchison
Consultant, developer and authorJoined on Oct 04, 2005

Tom Evslin
Joined on Apr 24, 2007

Ryan Baker
Advisor, Professional Services at Neustar Inc.Joined on May 07, 2014

Fred Tabsharani
VP of Marketing at Port25Joined on Mar 03, 2016

George Michaelson
Senior Research and Development Scientist at APNICJoined on Feb 12, 2010

Pinkard Brand
VP Strategy & Partner Relations, TLD Registry LimitedJoined on Jul 29, 2010

Bruce Van Nice
Director of Product Marketing at NominumJoined on Feb 12, 2009

Gunter Ollmann
Chief Security Officer at VectraJoined on May 10, 2011

Frank Schilling
FounderJoined on Aug 24, 2006

John Curran
President and CEO at American Registry for Internet Numbers (ARIN)Joined on Mar 31, 2007

Bret Swanson
President of Entropy EconomicsJoined on Feb 11, 2010

Tom Lenard
President, Technology Policy InstituteJoined on Apr 06, 2010

Ewan Sutherland
Telecommunications Policy AnalystJoined on Jan 01, 2006

Bill Nussey
CEO & AuhtorJoined on Feb 28, 2005

Paul Stahura
Founder and CEO Donuts Inc.Joined on Jul 18, 2003

Stéphane Van Gelder
MilathanJoined on Aug 27, 2008

Gregory Francis
Managing Director at Access PartnershipJoined on Sep 17, 2010

Joshua Braunstein
General Manager, CT CorsearchJoined on Feb 04, 2010

Baher Esmat
Joined on Dec 26, 2007

Burt Kaliski
Chief Technology Officer at VerisignJoined on Jun 06, 2012

Virendra Rode
Network ConsultantJoined on Feb 07, 2007