Chief Marketing Officer at MarkMonitor
Joined on November 18, 2008 – United States
Total Post Views: 22,495
Frederick Felman's career in marketing enterprise and security technology and services spans 25 years. At MarkMonitor, he is responsible for defining and promoting the company's brand protection product offerings. He and his team created the Brandjacking Index®, an often-cited measure of the trends in online abuse targeting the world's largest brands. As part of the MarkMonitor commitment to securing brands online, Frederick leads advocacy initiatives for brandholders' rights issues that intersect Internet governance. Before joining MarkMonitor, Frederick was Vice President of Products and Marketing at Zone Labs, which was acquired by Check Point Technologies. He received his Bachelor of Science in Business Administration from the University of Southern California.
Does the "technical issue" announced today in ICANN's TLD Application System (TAS) and the subsequent extension of the submission deadline call into question the stability and integrity of the new gTLD program? This development underscores the notion that ICANN could consider a more metered and staged approach to the introduction of gTLDs... more»
Courtesy of Brian Beckham from the WIPO Arbitration and Mediation Center in Geneva, here are a few important links with information that may be helpful for rights holders with ICANN's New gTLD program now launched and accepting applications more»
Surprisingly, and adding to the rapidly growing field of objections to ICANN's proposed expansion of the domain naming system, the group that represents individual Internet users in the ICANN community, the ICANN At-Large Advisory Committee, posted their advice on new Generic Top-Level Domains (gTLDs). more»
A common security prediction for 2010 is the continued rise of malware and phishing attacks on mobile phones. The MarkMonitor Security Operations Center recently detected an interesting twist on this theme involving a popular smartphone and the latest smart technologies used by cybercriminals. In this case, instead of compromising a smartphone to steal its information, cybercriminals used phishing techniques to clone smartphones. more»