Hot Topics:   ICANN    Policy & Regulation    Internet Governance    Domain Names    Security    Top-Level Domains    Cyberattack    more...

Featured Blogs

Exploiting the Firewall Beachhead: A History of Backdoors Into Critical Infrastructure

Gunter Ollmann There is no network security technology more ubiquitous than the firewall. With nearly three decades of deployment history and a growing myriad of corporate and industrial compliance policies mandating its use, no matter how irrelevant you may think a firewall is in preventing today's spectrum of cyber threats, any breached corporation found without the technology can expect to be hung, drawn, and quartered by both shareholders and industry experts alike. more»

Increasing the Strength of the Zone Signing Key for the Root Zone, Part 2

Duane Wessels A few months ago I published a blog post about Verisign's plans to increase the strength of the Zone Signing Key (ZSK) for the root zone. I'm pleased to provide this update that we have started the process to pre-publish a 2048-bit ZSK in the root zone for the first time on Sept. 20. Following that, we will publish root zones with the larger key on Oct. 1, 2016. more»

Making the Most of the Cloud: Four Top Tips

Jeff Becker Cloud computing is on the rise. International Data Corp. predicts a $195 billion future for public cloud services in just four years. That total is for worldwide spending in 2020 - more than twice the projection for 2016 spending ($96.5 billion). As a result, companies are flocking to both large-scale and niche providers to empower cloud adoption and increase IT efficacy. The problem? Without proper management and oversight, cloud solutions can end up underperforming, hampering IT growth or limiting ROI. more»

The Great Telco Quality Transformation

Martin Geddes The telecoms industry has two fundamental issues whose resolution is a multi-decade business and technology transformation effort. This re-engineering programme turns the current "quantities with quality" model into a "quantities of quality" one. Those who prosper will have to overcome a powerfully entrenched incumbent "bandwidth" paradigm, whereby incentives are initially strongly against investing in the inevitable and irresistible future. more»

SEO and New dot Brand gTLDs

Guillaume Pahud According to a recent study carried out by Custora in the USA, search engines -- paid and organic -- represent close to 50% of e-commerce orders, compared to 20% for direct entry. A dot brand domain has the potential to boost direct entry, as it can be more memorable than traditional domains. Can dot brand domains also be part of a consistent search engine strategy? more»

Filing Cybersquatting Complaints With No Actionable Claims

Gerald M. Levine I noted in last week's essay three kinds of cybersquatting complaints typically filed under ICANN'S Uniform Domain Name Dispute Resolution Policy (UDRP). The third (utterly meritless) kind are also filed in federal court under the Anticybersquatting Consumer Protection Act (ACPA). While sanctions for reverse domain name hijacking are available in both regimes, the UDRP's is toothless and the ACPA's a potent remedy. more»

Observation from Seminar on IANA Function Stewardship Transition Held by CAICT

Guo Feng On August 16 of 2016, the US Government announced its intention to transit the stewardship of the Internet Assigned Numbers Authority (IANA) function to the multistakeholder community upon the expiration of the IANA function Contract as of October 1 of 2016, barring any significant impediment... This announcement attracts the close attention of Internet community around the world and also in China. more»

Moving to the Cloud? 10 Key Questions for CIOs

Ryan Hunt Companies are moving to the cloud. According to Cloud Tech, CIOs are on the front lines: In 72 percent of companies surveyed, chief information officers lead the cloud computing charge. However, adoption without the right information is doomed to fail - here are 10 key questions CIOs should ask before moving operations to the cloud... First, it's critical to identify business benefits. Here the key to success lies in specifics rather than generalities... more»

Benefits and Challenges of Multiple Domain Names in a Single UDRP Complaint

Doug Isenberg How many domain names can be included in a single complaint under the Uniform Domain Name Dispute Resolution Policy (UDRP)? Neither the UDRP policy nor its corresponding rules directly address this issue, although the rules state that a "complaint may relate to more than one domain name, provided that the domain names are registered by the same domain-name holder." more»

Domain Name Association Supports IANA Transition, Petitions Congress to Move Forward

Roy Arbeit I recently sent a letter to congressional leaders including Speaker of the House Paul Ryan; House Minority Leader Nancy Pelosi; Senate Majority Leader Mitch McConnell and Senate Minority Leader Harry Reid expressing the Domain Name Association's support of the U.S. Administration's planned transition of the Internet Assigned Numbers Authority (IANA) to the global multi-stakeholder community under the stewardship of the Internet Corporation for Assigned Names and Numbers (ICANN). more»

Refutation of the Worst IANA Transition FUD

McTim Of all the patently false and ridiculous articles written this month about the obscure IANA transition which has become an issue of leverage in the partisan debate over funding the USG via a Continuing Resolution, this nonsense by Theresa Payton is the most egregiously false and outlandish. As such, it demands a critical, nearly line by line response. more»

Breaking Nonsense: Ted Cruz, IANA Transition and the Irony of Life

Wolfgang Kleinwächter Harvard Professor Karl Deutsch, the late nestor of political science, described world history as the "history of side effects". Political actions, according to his theory, always have side effects which go out of control and constitute new history. The history of the Internet is full of side effects. But this time, we could have special unproductive side effects. A failure of the IANA transition could trigger a process towards a re-nationalization of the borderless cyberspace... more»

Infrastructure for a Connected World

Bob Frankston Connected devices need a free-to-use infrastructure that allows for innovation beyond the needs of a provider or other intermediary. An interface is best when it disappears and the user can focus the problem at hand. In the same way infrastructure, is best when it can simply be assumed and becomes invisible. With an invisible infrastructure as with an invisible interface a user can concentrate on their tasks and not think about the computer. Dan Bricklin and I chose to implement VisiCalc on personal computers that people could just purchase. more»

The Kindness of Strangers, or Not

John Levine A few days ago I was startled to get an anti-spam challenge from an Earthlink user, to whom I had not written. Challenges are a WKBA (well known bad idea) which I thought had been stamped out, but apparently not. The plan of challenges seems simple enough; they demand that the sender does something to prove he's human that a spammer is unlikely to do. more»

DDOS Attackers - Who and Why?

Geoff Huston Bruce Schneier's recent blog post, "Someone is Learning How to Take Down the Internet", reported that the incidence of DDOS attacks is on the rise. And by this he means that these attacks are on the rise both in the number of attacks and the intensity of each attack. A similar observation was made in the Versign DDOS Trends report for the second quarter of 2015, reporting that DDOS attacks are becoming more sophisticated and persistent in the second quarter of 2016. more»

News Briefs

US Senators in Letter to Yahoo Say Late Hack Disclosure "Unacceptable"

"A group of Democratic U.S. senators on Tuesday demanded Yahoo Inc (YHOO.O) to explain why hackers' theft of user information for half a billion accounts two years ago only came to light last week and lambasted its handling of the breach as "unacceptable," reports Dustin Volz from Washington in Reuters. ›››

What Trump and Clinton Said About Cybersecurity in the First US Presidential Debate

The Internet and tech got very little mention last night during the first of three presidential debatest. The only notable exception was cybersecurity where moderator Lester Holt asked: "Our institutions are under cyber attack, and our secrets are being stolen. So my question is, who's behind it? And how do we fight it?" The following are the responses provided to the question by the two candidates. ›››

IANA Transition Must Move Forward, Says Google Senior VP and General Counsel

"Preserving a Free and Open Internet," is the title of a post published today by Kent Walker, Google's SVP and General Counsel. ›››

IP Address Information Misused by Authorities Says EFF, Not Enough to Justify Police Raids

"Law Enforcement, Courts Need to Better Understand IP Addresses, Stop Misuse," says EFF in whitepaper released on Thursday. ›››

Cybersecurity Regime for Satellites and other Space Assets Urgently Required, Warn Researchers

"A radical review of cybersecurity in space is needed to avoid potentially catastrophic attacks," warn researchers at the International Security Department of UK-based thinktank, Chatham House. ›››

Yahoo to Confirm Massive Data Breach, Several Hundred Million Users Exposed

"Yahoo is expected to confirm a massive data breach, impacting hundreds of millions of users," reports Kara Swisher today in Recode. ›››

Berners-Lee: Ted Cruz Wrong About How Free Speech Is Censored on the Internet

"Sen. Ted Cruz wants to engineer a United States takeover of a key Internet organization, ICANN, in the name of protecting freedom of expression," said Tim Berners-Lee and Daniel Weitzner in a co-op piece today in the Washington post. ›››

Close to 7.9 Million Domain Names Registered in Q2 2016

VeriSign, in its latest latest Domain Name Industry Brief, reports approximately 7.9 million new domain name registrations in the second quarter of 2016 which brings total number of domain name registrations to approximately 334.6 million across all top-level domains (TLDs) as of June 30, 2016. ›››

UK's National Cyber Security Centre Reveals Plans to Scale Up DNS Filtering

Speaking at the Billington Cyber Security Summit in Washington DC, Ciaran Martin, head of UK's Government Communication Headquarters (GCHQ) and the first Chief Executive of the new National Cyber Security Centre (NCSC), set out how the new organization will use DNS filters as part of its plan to curb cyberattacks. ›››

Internet, Mobile Connectivity a Lifeline for Refugees, Reports UNHCR

"Many refugees regard a connected device as being as vital to them as food, water or shelter," according to a new report from the UN Refugee Agency (UNHCR), and Accenture. ›››

US Senate Judiciary Subcommittee Hearing Held on IANA Transition

"I urge you: Do not give a gift to Russia and other authoritarian nations by blocking this transition," Lawrence Strickling, administrator of the U.S. Commerce Department's National Telecommunications and Information Administration, said on Wednesday at a Senate Judiciary Subcommittee Hearing Held on IANA Transition. ›››

Schneier: "Someone Is Learning How to Take down the Internet"

"Over the past year or two, someone has been probing the defenses of the companies that run critical pieces of the Internet," wrote renowned security expert, Bruce Schneier, in a piece published in Lawfare. ›››

Internet Architecture Board: IANA Transition Plan Is Fit for Purpose, Should Go Forward as Planned

The Internet Architecture Board (IAB) statement on the IANA Stewardship Transition released on Wednesday ›››

U.S. Justice Department Forms Group to Study National Security Threats of IoT

"The U.S. Justice Department has formed a threat analysis team to study potential national security challenges posed by self-driving cars, medical devices and other Internet-connected tools," reports Dustin Volz from Washington in Reuters" ›››

New York’s Department of Financial Services Issues Cybersecurity Proposal

New York state is proposing new rules requiring banks and insurance companies to establish cybersecurity programs and designate an internal cybersecurity officer. ›››

GAO Rules IANA Transition Not a Transfer of Government Property Requiring Congressional Approval

The Untied States Government Accountability Office (GAO) has concluded that the IANA transition is not a government transfer of property requiring congressional approval. ›››

Internet Society Urges Congress to Press Ahead with IANA Steward Transition

In a letter to key Congressional leaders, the Internet Society's CEO, Kathryn Brown, has urged Congress to allow the IANA stewardship transition to proceed without delay. The contract between the US Commerce Departments National Telecommunications and Information Administration (NTIA) and the Internet Corporation for Assigned Names and Numbers (ICANN) is set to expire on September 30. ›››

White House Appoints Retired Air Force General as First Cyber Security Chief

As part of its effort to improve defenses against hackers, the White House today named a retired U.S. Air Force Brigadier General Gregory J. Touhill as the first Federal Chief Information Security Officer (CISO) -- the position was announced eight months ago as part of Cybersecurity National Action Plan (CNAP). ›››

Republicans Barreling Toward a September Showdown Over IANA Transition

Republicans gear up for fight against internet transition," Ashley Gold and Tony Romm reporting in the POLITICO today. ›››

90% of Sky UK Broadband Customers Now IPv6 Enabled, Says Network is "Future Proofed"

"Sky completes roll out of IPv6 becoming the first major UK Internet provider to future-proof its service for customers," announced the company in a press release on Tuesday. ›››

Popular News – Last 30 Days

Recent Comments

Cartoons  –  From the Community

Meanwhile in Yet Another IG Panel

Sponsored Topics

Afilias

DNS Security

Sponsored by
Afilias
Afilias - Mobile & Web Services

Mobile

Sponsored by
Afilias - Mobile & Web Services
Verisign

Security

Sponsored by
Verisign
Port25

Email

Sponsored by
Port25

Industry Updates

The .cancerresearch TLD: Search for Cure Drives Digital Innovation

Neustar Coinciding with the launch of the International Centre for the Proteome of Human Cancer (ProCan™), the Australian Cancer Research Foundation (ACRF) has added www.procan.cancerresearch to its growing network of sites on the .cancerresearch TLD. more»

New TLD? Make Sure It's Secure

Neustar The introduction of hundreds of new Top-Level Domains (TLDs) is an exciting time for consumers, businesses, and the Internet community as a whole. However, malicious actors seeking new channels to pursue their activities are also rubbing their hands together with the launch of these TLDs. more»

Radix Launches Startup League at TechCrunch

Radix The Startup League is a unique startup-support program designed to aid early stage startups that use any of Radix's TLDs to launch their idea or company. This initiative will support startups across several key areas like marketing, event sponsorships, and PR. more»

Celebrating One Year of .online

Radix Last year this time, one of the most awaited new gTLDs, .ONLINE entered general availability followed by a successful launch. With 10,000 registrations in the first 10 minutes and 38,000 in the first 24 hours, it was one of the most sought after extensions by customers globally. more»

Verisign Releases Q2 2016 DDoS Trends Report - Layer 7 DDoS Attacks a Growing Trend

Verisign Verisign today released its Q2 2016 DDoS Trends Report providing a unique view into online distributed denial of service (DDoS) attack trends from mitigations enacted on behalf of customers of Verisign DDoS Protection Services, and research conducted by Verisign iDefense Security Intelligence Services. more»

LogicBoxes Launches the New Elite Reseller Program

LogicBoxes LogicBoxes, the leading provider of web presence automation solutions for Web Hosts, Domain Resellers and ICANN Registrars, today announced the launch of its new Elite Reseller Program. This program lays a strategic focus on fast-growing Web Hosting Providers. more»

Miss.Africa Announces 2016, Round II Seed Funding Tech Initiative for Women in Africa

DotConnectAfrica In a #STEM4girls Pan-African campaign, the Miss.Africa program is mobilizing a Round II Seed Fund for Tech initiatives in Africa that will avail small grants to support women and girls in the Science, Technology, Engineering and Mathematics (STEM) fields to launch or expand their own initiatives. more»

How Savvy DDoS Attackers Are Using DNSSEC Against Us

Neustar Neustar this week published a research report, "DNSSEC: How Savvy DDoS Attackers Are Using Our Defenses Against Us," detailing how Domain Name System Security Extensions (DNSSEC) can be subverted as an amplifier in Distributed-Denial-of-Service (DDoS) attacks. more»

Airpush Chooses DeviceAtlas to Provide Device Awareness to Mobile Ad Network

Afilias - Mobile & Web Services Mobile Advertising firm Airpush and Afilias announced today that DeviceAtlas is now powering device detection and targeting on its advertising network for Android and iOS apps. more»

DeviceAtlas Releases Q2 2016 Mobile Web Intelligence Report, Apple Loses Browsing Market Share

Afilias - Mobile & Web Services DeviceAtlas, a leading supplier of intelligence on mobile devices, today released its quarterly Mobile Web Intelligence Report for Q2 2016, which analyzes mobile device traffic to hundreds of thousands of websites around the world. more»

Afilias Acquires Premium TLDs .ARCHI, .BIO and .SKI

Afilias Afilias announces the acquisition of StartingDot, the Registry Operator for 3 new TLDs: .ARCHI, .BIO and .SKI. The acquisition agreement is part of Afilias' ongoing program of acquiring new TLDs to add to its portfolio. StartingDot's TLDs are a good fit with other Afilias TLD's such as .ORGANIC, .GREEN, .BLUE, and .PRO. more»

Companies

Community  –  CircleID Participants  |  View All  |  Join CircleID

Jennifer Wolfe
Dot Brand Strategy AdvisorJoined on Oct 12, 2014

Dave Burstein
Editor, DSL PrimeJoined on Apr 10, 2008

Statton Hammock
Vice-President, Business & Legal Affairs, RightsideJoined on Oct 07, 2009

J. Scott Evans
Trademark Director and Associate General Counsel at AdobeJoined on Jul 13, 2015

Robert Rozicki
One of those domain name typesJoined on Sep 15, 2004

Lee S Dryburgh
Founder of eComm Media, IncJoined on Feb 12, 2008

Johnny Du
VP, StableTone LtdJoined on Oct 22, 2010

Greg Reber
CEO of AsTech ConsultingJoined on Jun 30, 2010

Jothan Frakes
Domain Name Industry ConsultantJoined on Jul 22, 2004

Susan Crawford
Professor, Cardozo Law School in New York CityJoined on Nov 19, 2003

Jennie-Marie Larsen
CEO at DomainDictionJoined on Sep 23, 2011

Jean Guillon
New generic Top-Level Domains' specialistJoined on Aug 29, 2008

Kathy Brown
President and CEO, Internet SocietyJoined on Oct 20, 2015

David Eisner
President & CEO at Dataprise, IncJoined on Mar 13, 2014

Don Moody
Domain Name & IP attorney in Los Angeles, co-founder of New gTLD DisputesJoined on Nov 14, 2007

Gordon Cook
Joined on Sep 10, 2007

Joi Ito
Joined on Apr 11, 2005

Terry Zink
Program ManagerJoined on Aug 20, 2007

Alec Saunders
Vice President, Developer Relations, BlackBerry Joined on Apr 24, 2007

Guillaume Pahud
CEOJoined on Jan 18, 2016

Paul Parisi
Chief Technology Officer at DNSstuff.comJoined on Oct 15, 2008

Sam Dickinson
Internet governance consultant & writerJoined on Aug 05, 2010

Elliot Noss
President and CEO of Tucows Inc.Joined on Jul 20, 2003

Richard Henderson
Active member of the At Large constituencyJoined on Oct 11, 2003

Eric Hernaez
Chief Executive Officer of NetmoboJoined on Jun 15, 2007

Henry Lancaster
Senior Analysts at Paul Budde CommunicationJoined on Jun 04, 2009

Bill Smith
Sr. Policy Advisor, Technology Evangelist at PayPalJoined on Aug 23, 2011

Gregory Francis
Managing Director at Access PartnershipJoined on Sep 17, 2010

Arun Raghu
Technology Policy AdviserJoined on Apr 21, 2015

Steven Bellovin
Professor of Computer Science at Columbia UniversityJoined on Dec 02, 2008