Hot Topics:   Cybersecurity    Policy & Regulation    Domain Names    Internet Governance    Cybercrime    Whois    Cyberattack   

Featured Blogs

Lessons From an E-Voting Debacle

Anthony Rutkowski There has been a significant focus over the past two years on the vulnerability and cyber threat risks faced for voting systems at the local level. That focus has typically been on State and local jurisdictions like cities, counties and towns, and resulted in the creation of the DHS Elections Infrastructure Information Sharing and Analysis Center (ISAC) to assist. However, there are other local governance entities at significant risk as well. more

Cybercriminals Weaponize Bulk-Registered Domain Names

Lyman Chapin Domain names that can be rapidly acquired, used in an attack, and abandoned before they can be traced are a critical resource for cybercriminals. Some attacks, including spam and ransomware campaigns and criminal infrastructure operation (e.g., "botnets"), benefit particularly from the ability to rapidly and cheaply acquire very large numbers of domain names – a tactic known as bulk registration. more

Key Success Factors for Top-Level Domains: An Evaluation Grid

Loic Damilaville It isn't always easy to explain the whys and wherefores of domain name market trends. Major indicators such as growth are usually generalised, given that they are based on data common to all stakeholders, but the causes behind fluctuations are hard to pin down. And structural causes need to be separated from cyclical ones, which may be the source of major variations, as was the case with the domaining waves in China, without actually reflecting long-term market trends. more

The Unbelievably High Cost of the War Against Huawei

Dave Burstein U.S. companies were selling $11 billion a year of parts to Huawei before the blockade. Losing those sales is just the start of the damage. Every other Chinese and Russian company is making sure to find non-US suppliers. The U.S. has threatened India and Turkey with sanctions as well. As other companies replace U.S. components, the impact will be tens of billions more than the $11 billion of Huawei suppliers. more

Shame on the Regulators

Doug Dawson It's clear that even before the turn of this century that the big telcos largely walked away from maintaining and improving residential service. The evidence for this is the huge numbers of neighborhoods that are stuck with older copper technologies that haven't been upgraded. The telcos made huge profits over the decades in these neighborhoods and ideally should not have been allowed to walk away from their customers. more

Let's Have an Honest Conversation About Huawei

Milton Mueller On May 29, I attended an AEI event on "International economics and securing next-generation 5G wireless networks," with Ambassador Robert Strayer, who heads the U.S. State Department's CIP team. But the focus of the talk was not really on 5G security, international trade or 5G development. In fact, there was no constructive agenda at all. The talk was an extended attack on China and the Chinese-based telecommunications vendor Huawei – another episode in an ongoing U.S. government campaign to shut Huawei and other Chinese firms out of the U.S. market, and to convince every other country in the world to do the same. more

Domain Enforcement in a Post-GDPR World

Frederick Felman The implementation of the General Data Protection Regulation (GDPR), and ICANN's conservative temporary policy, which favors privacy and limits registrar liability, has made domain enforcement against cybersquatters, cyber criminals and infringement more difficult, expensive and slow. With heightened concerns over privacy following high-profile breaches of consumer data and its subsequent illicit use and distribution, there is no question that consumer data protection practices would come under scrutiny. more

The Myth of 5G and Driverless Cars

Doug Dawson A colleague sent me an article that had been published earlier this year in MachineDesign magazine that predicts that driverless cars can't be realized until we have a ubiquitous 5G network. When looking for the original article on the web I noticed numerous similar articles like this one in Forbes that have the same opinion. These articles and other similar articles predict that high-bandwidth, low-latency 5G networks are only a few years away. more

Interstate at Rush Hour …in the Rain …on a Friday – AKA, Your Enterprise Traffic on the Net

Sean Kaine Congestion. Traffic. Two words that draw a visceral response, whether you are commuting to work or managing a network. Managing data traffic used to be easy. Everything was housed in centralized data centers, and all traffic was routed through big, dedicated, effective but expensive "pipes" -- Multiprotocol Label Switching (MPLS) links. When all the applications are at the data center, it makes sense to build private access for all traffic. more

Celebrating Twenty Years of the UDRP

Caroline Valle The Uniform Domain Name Dispute Resolution Policy, commonly known as the UDRP, was first introduced on October 24, 1999, by the Internet Corporation for Assigned Names and Numbers (ICANN). The UDRP is incorporated by reference into Registration Agreements for all generic top-level domain names (gTLDs) and some country-code top-level domain names (ccTLDs). more

The Loss of a Friend

Veni Markovski Dear colleagues and friends, it is very, very difficult to write these words. The loss of a young person is always a tragedy. The untimely loss of a friend is even worse and is always a very difficult time. The loss of a fellow Internet pioneer is like losing a brother. Tarek Kamel was a great friend of the Internet Society–Bulgaria. I remember him giving an interview for the Bulgarian public television in Yokohama during the INET 2000 meeting... more

Gartner Says SDN Has Left the Building – Say Hello to Network Automation

Juha Holkkola In their annual hype cycle on on network technologies, Gartner lists the emerging technologies and an estimate of the timeframe in which they will reach the plateau of productivity. The latest hype cycle on enterprise networking labels Software-Defined Networks (SDN) as an obsolete technology. So on the surface, it would appear that SDN is now semi-officially dead. While most natural scientists accept the Darwinian theories, the technology industry has traditionally been trying to defy evolution. more

The "Kiwi" Way of Interneting

Konstantinos Komaitis By now, we are all exposed to the narrative of how the Internet is no longer a safe place. It is full of bots, misinformation, abuse and violence; it is a space that has been overtaken by terrorists and extremists. The Internet is weaponized to influence elections, undermine democracies, and instill fear in its users. That's the story we are told. No one can deny the swift change that is taking place in global politics. The "brave new world" that has emerged is, currently, based on isolation and fear. more

Encryption and Child Sexual Abuse Prevention

Jeremy Malcolm Just over one week ago, the New York Times published a major investigation into the intractable problem of illegal sexual images of minors being exchanged online. Despite flaws in the story and its companion pieces, the main take-away that Internet companies have failed to adequately address the problem has resonated widely. Prostasia Foundation too has been critical of some of the Internet platforms called out in the article. But at the same time, we need to be realistic about how much responsibility we can (or should) place on tech firms to solve this problem. more

The Crypto Wars Resume

Steven Bellovin For decades, the US government has fought against widespread, strong encryption. For about as long, privacy advocates and technologists have fought for widespread, strong encryption, to protect not just privacy but also as a tool to secure our computers and our data. The government has proposed a variety of access mechanisms and mandates to permit them to decrypt (lawfully) obtained content; technologists have asserted that "back doors" are inherently insecure. more

News Briefs

New Zealand's Top-Level Domain Manager Seeking New Registry Service Provider for .nz

The manager for .nz announced today that they have launched a registry replacement process and are calling for expressions of interest from potential service providers by November 29th. more

Leading Domain Registries and Registrars Release Joint Document on Addressing 'DNS Abuse'

A group of leading domain name registries and registrars have joined forces in the fight against abuse in the Domain Name System (DNS), by developing a "Framework to Address Abuse." Each contributing company has shared its expertise and experience mitigating abusive practices with the goal of submitting the resulting Framework as a foundational document for further discussion in the multistakeholder community.  more

Germany's New Rules for Developing 5G Mobile Networks Will Not Exclude China's Huawei Technologies

German regulators have released a set of guidelines addressing network security for companies wanting to help build next-generation 5G infrastructure. more

China's App Allows "Superuser" Access to Entire Data of Over 100 Million Android-Based Phones

The Chinese Communist Party's app called Study the Great Nation released in January is reported to have "superuser" access to the entire data of over 100 million Android-based phones via a backdoor. more

China to Require Face Scan for Internet Access and New Phone Numbers Starting December

Chinese citizens will be required to let telecommunications carriers to scan their faces in order to sign up for internet access or to get a new phone number. more

EU Member States Release Report on Coordinated Risk Assessment on Cybersecurity in 5G Networks

European Union Member States published a report on the 'EU coordinated risk assessment on cybersecurity in Fifth Generation (5G) networks'. The report is based on the results of the national cybersecurity risk assessments by all EU Member States. It identifies the main threats and threats actors, the most sensitive assets, the main vulnerabilities, and several strategic risks. more

More Than 500 Schools in the U.S. Hit by Ransomware in 2019, Says Report

A recent report published by the cybersecurity firm Armor says ransomware infections have hit over 500 US schools in 2019 to date. Armor warns the rate of attack seems to be picking up with 15 new ransomware victims in the last two weeks, all of them educational institutions. more

US Court Upholds FCC's Net Neutrality Repeal But Says States Can't Be Barred from Passing Own Rules

A U.S. court decision today determined net neutrality laws could return at the state level overruling Trump administration's effort to block states from passing their own net neutrality laws. more

The U.S. House Judiciary Committee Is Investigating Google's Plans to Implement DNS Over HTTPS

The U.S. House Judiciary Committee is investigating Google's plans to implement DNS over HTTPS (DoH) in Chrome according to a report by the Wall Street Journal over the weekend. more

27 Countries Issue Joint Statement on 'Advancing Responsible State Behavior in Cyberspace'

The joint statement was released on Monday at the United Nations ahead of the UN General Assembly's General Debate calling on all states to support the evolving framework and to join in ensuring "greater accountability and stability in cyberspace." more

Cyber Risk Now on Top of Corporate Risk Agendas, Cyber Insurance Expanding

Results from the 2019 Marsh-Microsoft Global Cyber Risk Perception survey indicates several encouraging signs of improvement in the way organizations view and manage cyber risk. more

Legacy TLD .ORG Takes On New Branding Focus as Part of a New Transformative Journey, Says PIR

Public Interest Registry (PIR), the non-profit organization in charge of operating the 34-year-old legacy top-level domain .ORG on Tuesday revealed a new global brand, including a new visual identity and a new website named TheNew.org. more

Wi-Fi Alliance Launches Wi-Fi 6 Certification Program

Wi-Fi Alliance, the non-profit entity that oversees implementation of the Wi-Fi standard, officially launches the Wi-Fi 6 certification program. more

281 Arrested Worldwide by US Federal Authorities in Connection With Business Email Compromise Scheme

U.S. Department of Justice says federal authorities successfully carried out a "significant" coordinated effort to disrupt Business Email Compromise (BEC) schemes designed to intercept and hijack wire transfers from businesses and individuals. more

The Insecurity of the IoT is Only Getting More Profound, Says Principal Researcher at F-Secure

"Three years after Mirai first appeared, and two years after WannaCry, it shows that we still haven't solved the problems leveraged in those outbreaks," said F-Secure Principal Researcher Jarno Niemela. more

51 CEOs Call on US Congress for Urgent Nationwide Data Privacy Law Overriding State-Level Laws

A letter, signed by 51 CEOs, was sent to U.S. House and Senate and leaders of other committees today urging policymakers to pass a comprehensive national data privacy law. more

Ransomware Causes 15 Schools in Arizona To Stay Closed For a Second Day

The Flagstaff Unified School District (FUSD), in Arizona which consists of 15 schools and over 9,600 students, canceled classes on both Thursday and Friday after a ransomware virus was found on multiple servers. more

Phishing Attacks Targeting Executives Now Top Cybersecurity Insurance Claims, Says AIG

A new report published by the insurance giant, AIG, claims phishing attacks via email, often targeted at senior executives, has overtaken ransomware. more

Hong Kong ISPs Oppose Government Plans for Internet Restrictions Without Industry Consultation

A statement released by the Hong Kong Internet Service Providers Association (HKISPA) denouncing any plans that would restrict Hong Kong's open internet network. more

By 2021 Cost of Cybercrime to Top Annual Natural Disasters and Global Drug Trade Costs, Says Report

By 2021, it is estimated that cybercrime will cost the global economy more than $6 trillion in damages, exceeding annual costs for natural disasters and the global drug trade. more

Most Read – Last 30 Days

Recent Comments

Domain Enforcement in a Post-GDPR World
Domain Enforcement in a Post-GDPR World
Domain Enforcement in a Post-GDPR World
Domain Enforcement in a Post-GDPR World
Domain Enforcement in a Post-GDPR World
Celebrating Twenty Years of the UDRP
The Myth of 5G and Driverless Cars
RIP Don Blumenthal

Topics

IP Addressing

Sponsored byAvenue4 LLC

DNS Security

Sponsored byAfilias

Cybercrime

Sponsored byThreat Intelligence Platform

New TLDs

Sponsored byAfilias

Whois

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

Industry Updates

Information Rights Management or User Access Management, Which One Is Better?

WhoisXML API The current security landscape calls for intensive monitoring and analysis to effectively identify possible threats to applications, systems, and infrastructure. With millions of threats discovered monthly, security experts must revamp and update their cybersecurity measures and tools. more

Blacklisting or Whitelisting, Which Is Better?

WhoisXML API Organizations in the cybersecurity industry must make crucial decisions to ensure they do the job right. One of these decisions includes whether to use blacklisting or whitelisting. more

Can Security Operations Centers (SOC) Benefit from Third-Party Threat Intelligence?

Threat Intelligence Platform (TIP) Businesses today have to deal with cybersecurity issues daily. Recent trends show an ever-increasing number of hacked networks and breached data. Studies also show that those victimized often have weak cybersecurity measures in place, forcing them to spend more on resources to combat oncoming attacks. more

4 Challenges in Digital Rights Management to Reflect On

Ipify Digital rights management (DRM) is undoubtedly a hot topic in today's connected environment. As over-the-top (OTT) media distribution channels fortify month after month, so do the risks that come with their use. Data theft, billion-dollar revenue losses, and compliance issues are just a few of these risks. As the year draws to a close, let's examine the persistent challenges in the DRM space and how IP geolocation can help in some cases. more

Neustar and usTLD Stakeholder Council to Hold .US Town Hall Live Webcast

Neustar Join Neustar's town hall meeting and help shape the future of .US. Neustar, a leading provider of registry services, is hosting a live town hall forum to discuss the United States' country code Top-Level Domain, .US. It's a can't-miss event for anyone interested in the future of .US. more

The More Threat Intelligence Integrated Into Security Solutions, the Better?

Threat Intelligence Platform (TIP) Today's sophisticated threats present enormous risks for any business. The more connected a company is, the more prone it is to cyber attacks. Enterprises need to devise ways to protect the integrity of their data and ensure that their systems are safe from cyberthreats. more

Online Streaming: Boon or Bane to the Media Industry and Digital Rights Management?

WhoisXML API Copyright infringement laws have become less effective due to the ease of sharing content over the Web. Music streaming services, for example, have increased music consumption and the overall industry revenue, but it also has lessened album sales and song downloads. more

Do IP Geolocation Data Improve User Access Management (UAM)?

Ipify Some organizations have specific policies that limit employee access to information. However, not all have sophisticated security solutions in place to protect against unauthorized access, especially amid cyber attacks that occur left and right. more

Why Companies Should Strive to Stay on Google's Good Side

WhoisXML API Imagine that your registrar informs you the domain you've been eyeing would soon become available for purchase. That's good news. However, your security adviser told you to make sure a domain is threat-free before you buy it. more

Can Domain Blacklisting Be Avoided?

WhoisXML API If we're to sum up what any domain owner would want to avoid, it would be ending up in anyone's blacklist. Domain blacklisting has detrimental consequences for any business. Actually, it can have the same or similar negative brand effects as you'd see in the aftermath of a data breach or PR incident. more

How to Stay Safe Against DNS-Based Attacks

WhoisXML API The Domain Name System (DNS) plays an essential role in resolving IP addresses and hostnames. For organizations, it ensures that users reach the proper sites, servers, and applications. While it's a fundamental base for a functioning Web, the problem is that this system can easily be abused. more

Radix Adds .UNO to Its Domain Portfolio

Radix Radix, leading new domains registry with over 5M domains under management, has acquired .UNO, a top-level domain that was previously operated by Dot Latin LLC. The ownership transfer was completed in September 2019 and Radix now has exclusive rights to operate .UNO globally. more

More than Ever: Why Organizations Need Proactive Defense in 2019

Threat Intelligence Platform (TIP) In the first half of 2019 alone, several data breaches have already exposed as many as 4.1 billion personal records. We've seen even industry giants and low-key players alike succumb to all kinds of data compromise. more

NS1 Raises $33M for Its Application Traffic Management Solutions

NS1 The round was led by Dell Technologies Capital, with participation from Cisco Investments and existing investors Deutsche Telekom Capital Partners, Entrée Capital, Flybridge Capital Partners, GGV Capital, Mango Capital, Salesforce Ventures, Sigma Prime Ventures, Telstra Ventures, and Two Sigma Ventures. more

Unraveling Unsolved Mysteries with Threat Intelligence

Threat Intelligence Platform (TIP) Have you ever heard of Lake City Quiet Pills? It refers to a mysterious site that first made waves on Reddit in 2009 and has since resurfaced. What Is Lake City Quiet Pills? more

Procuring Digital Evidence for Reverse Domain Hijacking Case with Domain Research & Monitoring Tools

WhoisXML API Reverse domain name hijacking is a shady practice that some individuals and organizations carry out. It occurs when a trademark owner makes false claims in an attempt to gain control of a domain that someone else owns. more

The Importance of Predictive Analytics and Machine Learning in Cybersecurity

WhoisXML API Experts in the realm of cybersecurity are continually trying to keep up with the changes in the threat landscape. Even with advanced tools on hand, any IT security professional knows that a data breach can happen at any time. more

Leading Voices  –  From our corporate sponsors

Dr. James Galvin Director, Technical Standards at Afilias 3 posts viewed 45,342 times
Paul Livesay VP and Counsel at Verisign 1 post viewed 12,561 times
Marc Lindsey President and Co-founder at Avenue4 LLC 5 posts viewed 34,983 times
Duane Wessels Distinguished Engineer at Verisign 6 posts viewed 63,125 times
Danny McPherson Executive Vice President and Chief Security Officer at Verisign 12 posts viewed 141,375 times
Burt Kaliski Chief Technology Officer at Verisign 19 posts viewed 183,869 times
Ram Mohan Executive Vice President & CTO, Afilias 33 posts viewed 588,726 times
Roland LaPlante Senior Vice President and Chief Marketing Officer at Afilias 17 posts viewed 213,757 times
John Kane Vice President of Corporate Services, Afilias 4 posts viewed 54,835 times
Chuck Gomes VP of Policy and Compliance, Naming and Directory Services at VeriSign 2 posts viewed 24,944 times
Janine Goodman Vice President and Co-founder at Avenue4 LLC 6 posts viewed 45,807 times
Scott Hollenbeck Senior Director of the Verisign Registry Services Lab 12 posts viewed 138,461 times
Jonathan Robinson Executive Chairman at Afilias 1 post viewed 8,531 times
Shumon Huque Principal Research Scientist at Verisign Labs 1 post viewed 15,288 times
Keith Drazek Vice President, Public Policy & Government Relations at Verisign 2 posts viewed 19,319 times