CINXE.COM

Ram Mohan on CircleID

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en"> <head> <title>Ram Mohan on CircleID</title> <meta name="description" content="Profile page of Ram Mohan on CircleID" /> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <link rel="alternate" type="application/rss+xml" title="Feed for Ram Mohan" href="https://circleid.com/rss/members/1080" /> <link rel="shortcut icon" type="image/ico" href="/favicon.ico" /> <link rel="stylesheet" type="text/css" media="all" href="/css/base.css" /> <link rel="stylesheet" type="text/css" media="all" href="/css/posts.css" /> <link rel="stylesheet" type="text/css" media="all" href="/css/members.css" /> <script src="https://ajax.googleapis.com/ajax/libs/jquery/3.2.1/jquery.min.js"></script> <link href="https://fonts.googleapis.com/css2?family=PT+Serif:ital,wght@0,400;0,700;1,400;1,700&family=Roboto+Condensed:wght@400;700&family=Roboto+Mono:wght@300;400;700&family=Roboto:ital,wght@0,400;0,500;0,700;0,900;1,400;1,700&display=swap" rel="stylesheet"> <script type="text/javascript" src="/js/jq.clickmenu/jq.clickmenu.min.js"></script> <script type="text/javascript" src="/js/jq.scrollable/scrollable.min.js"></script> <script async src="https://cse.google.com/cse.js?cx=003374819184044847448:yb5rk7pq36s"></script> <!-- font awesome --> <script defer src="/fontawesome-free-6.6.0-web/js/brands.js"></script> <script defer src="/fontawesome-free-6.6.0-web/js/solid.js"></script> <script defer src="/fontawesome-free-6.6.0-web/js/fontawesome.js"></script> <div id="fb-root"></div> <script>(function (d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/sdk.js#xfbml=1&version=v2.5"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk'));</script> <script type="text/javascript"> $(document).ready(function() { $('.showHideBox').hide(); $('a#clickToggle').click(function() { $('.showHideBox').toggle(); $(this).toggleClass("toggle-show"); $(this).toggleClass("toggle-hide"); return false; }); }); </script> <!-- GA code --> <script> (function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m) })(window,document,'script','https://www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-85374710-1', 'auto'); ga('send', 'pageview'); </script> </head> <body> <div id="header"> <a href="/"><img class="headerLogo" src="/images/circleid.svg" border="0"/></a> <div class="headerLinks"> <span> Welcome:&nbsp;&nbsp; <a href="https://circleid.com/account/login">Login</a> &nbsp;|&nbsp; <a href="https://circleid.com/account/signup">Sign Up</a> &nbsp;|&nbsp; <a href="https://circleid.com/about">About CircleID</a> </span> <span> Follow:&nbsp;&nbsp; <a href="https://x.com/circleid" class="socialIcon"><i class="fa-brands fa-square-x-twitter"></i></a> &nbsp;|&nbsp; <a href="https://www.facebook.com/circleid/" class="socialIcon"><i class="fa-brands fa-square-facebook"></i></a> &nbsp;|&nbsp; <a href="https://www.linkedin.com/company/circleid" class="socialIcon"><i class="fa-brands fa-linkedin"></i></a> &nbsp;|&nbsp; <a href="http://feeds.circleid.com/cid_master/" class="socialIcon"><i class="fas fa-rss-square"></i></a> </span> </div> <div class="clear"></div> </div> <noscript> <div id="headerAlert">&nbsp;WARNING: JavaScript is either disabled or not supported by your browser. You may encounter problems using various features on CircleID.&nbsp;</div> </noscript> <div id="headerNav"> <div id="headerNavContent"> <div id="headerNavMenu"> <ul> <li ><span class="head_menu"><a href="/">Home</a></span></li> <li> <span class="head_menu"><a href="https://circleid.com/topics">Topics</a><img src="/js/jq.clickmenu/arrow.gif" class="arrow" /></span> <div class="subMenu" style="width:480px;"> <table border="0" cellpadding="0" cellspacing="0"> <tr> <td> <a href="https://circleid.com/topics/access_providers">Access Providers</a> <a href="https://circleid.com/topics/artificial-intelligence">Artificial Intelligence</a> <a href="https://circleid.com/topics/blockchain">Blockchain</a> <a href="https://circleid.com/topics/brand_protection">Brand Protection</a> <a href="https://circleid.com/topics/broadband">Broadband</a> <a href="https://circleid.com/topics/censorship">Censorship</a> <a href="https://circleid.com/topics/cloud_computing">Cloud Computing</a> <a href="https://circleid.com/topics/cyberattack">Cyberattack</a> <a href="https://circleid.com/topics/cybercrime">Cybercrime</a> <a href="https://circleid.com/topics/cybersecurity">Cybersecurity</a> <a href="https://circleid.com/topics/data_center">Data Center</a> <a href="https://circleid.com/topics/ddos_attack">DDoS Attack</a> <a href="https://circleid.com/topics/dns">DNS</a> <a href="https://circleid.com/topics/dns-security">DNS Security</a> <a href="https://circleid.com/topics/domain-management">Domain Management</a> <a href="https://circleid.com/topics/domain_names">Domain Names</a> <a href="https://circleid.com/topics/email">Email</a> <a href="https://circleid.com/topics/enum">Enum</a> <a href="https://circleid.com/topics/gaming">Gaming</a> <a href="https://circleid.com/topics/icann">ICANN</a> <a href="https://circleid.com/topics/internet_governance">Internet Governance</a> <a href="https://circleid.com/topics/internet_of_things">Internet of Things</a> <a href="https://circleid.com/topics/internet_protocol">Internet Protocol</a> <a href="https://circleid.com/topics/ipv4-markets">IPv4 Markets</a> </td> <td style="border-left:1px solid #d5d5d5;border-right:1px solid #d5d5d5;padding:0 4px;"> <a href="https://circleid.com/topics/iptv">IPTV</a> <a href="https://circleid.com/topics/ipv6-transition">IPv6 Transition</a> <a href="https://circleid.com/topics/law">Law</a> <a href="https://circleid.com/topics/malware">Malware</a> <a href="https://circleid.com/topics/mobile_internet">Mobile Internet</a> <a href="https://circleid.com/topics/multilinguism">Multilinguism</a> <a href="https://circleid.com/topics/net_neutrality">Net Neutrality</a> <a href="https://circleid.com/topics/networks">Networks</a> <a href="https://circleid.com/topics/new_tlds">New TLDs</a> <a href="https://circleid.com/topics/p2p">P2P</a> <a href="https://circleid.com/topics/policy_regulation">Policy &amp; Regulation</a> <a href="https://circleid.com/topics/privacy">Privacy</a> <a href="https://circleid.com/topics/regional_registries">Regional Registries</a> <a href="https://circleid.com/topics/registry_services">Registry Services</a> <a href="https://circleid.com/topics/satellite-internet">Satellite Internet</a> <a href="https://circleid.com/topics/spam">Spam</a> <a href="https://circleid.com/topics/telecom">Telecom</a> <a href="https://circleid.com/topics/udrp">UDRP</a> <a href="https://circleid.com/topics/voip">VoIP</a> <a href="https://circleid.com/topics/vpn">VPN</a> <a href="https://circleid.com/topics/web">Web</a> <a href="https://circleid.com/topics/white_space">White Space</a> <a href="https://circleid.com/topics/whois">Whois</a> <a href="https://circleid.com/topics/wireless">Wireless</a> </td> <td style="padding:0 0 0 4px;"> <div class="itemTitle">Display Options:</div> <a href="https://circleid.com/topics">List by Popularity</a> <a href="https://circleid.com/topics/chart">Chart by Popularity</a> </td> </tr> </table> </div> </li> <li> <span class="head_menu"><a href="https://circleid.com/blogs">Blogs</a><img src="/js/jq.clickmenu/arrow.gif" class="arrow" /></span> <div class="subMenu"> <a href="https://circleid.com/blogs">Latest</a> <a href="https://circleid.com/blogs/recently_discussed">Recently Discussed</a> <a href="https://circleid.com/blogs/most_discussed">Most Discussed</a> <a href="https://circleid.com/blogs/most_viewed">Most Viewed</a> </div> </li> <li> <span class="head_menu"><a href="https://circleid.com/news">News</a><img src="/js/jq.clickmenu/arrow.gif" class="arrow" /></span> <div class="subMenu"> <a href="https://circleid.com/news">Latest</a> <a href="https://circleid.com/news/recently_discussed">Recently Discussed</a> <a href="https://circleid.com/news/most_discussed">Most Discussed</a> <a href="https://circleid.com/news/most_viewed">Most Viewed</a> </div> </li> <li> <span class="head_menu"><a href="https://circleid.com/community">Community</a><img src="/js/jq.clickmenu/arrow.gif" class="arrow" /></span> <div class="subMenu"> <a href="https://circleid.com/community">Recently Featured</a> <a href="https://circleid.com/community/most_featured">Most Featured</a> <a href="https://circleid.com/community/most_active">Most Active</a> <a href="https://circleid.com/community/most_read">Most Read</a> <a href="https://circleid.com/community/recent_members">Recent Members</a> <a href="https://circleid.com/community/top_100" class="itemLine">Top 100 Leaderboard</a> <a href="https://circleid.com/community/alphabetical" class="itemLine">Alphabetical View</a> <a href="https://circleid.com/community/random">Random View</a> <a href="https://circleid.com/comments" class="itemLine">Recent Comments</a> </div> </li> <li> <span class="head_menu"><a href="https://circleid.com/industry">Industry</a><img src="/js/jq.clickmenu/arrow.gif" class="arrow" /></span> <div class="subMenu"> <a href="https://circleid.com/industry">Latest Posts</a> <a href="https://circleid.com/industry/most_viewed">Most Viewed</a> <a href="https://circleid.com/industry/leaderboard">Leaderboard</a> <a href="https://circleid.com/industry/members" class="itemLine"><strong>CircleID Members:</strong></a> <a href="/members/8495">CSC</a> <a href="/members/9196">Brand Registry Group</a> <a href="/members/9484">DNIB.com</a> <a href="/members/7855">i2Coalition</a> <a href="/members/1582">Godaddy Registry</a> <a href="/members/8076">Internet Commerce Association</a> <a href="/members/8622">IPv4.Global</a> <a href="/members/6851">Radix Registry</a> <a href="/members/8414">Threat Intelligence Platform (TIP)</a> <a href="/members/5593">Verisign</a> <a href="/members/8352">WhoisXML API</a> </div> </li> </ul> </div> <style> /* Search Box */ form.gsc-search-box { font-size: 14px; margin: 0 0 0 0; width: 100%; padding:0; } table.gsc-search-box td.gsc-input { padding:0 3px 5px 0; } /* Search input */ .gsc-input { font-size: 15px; } /* Search Button */ .gsc-search-button-v2 { font-size: 0; padding: 7px 12px; width: auto; vertical-align: middle; margin: -5px 0 0 0; } </style> <!-- search --> <div style="width:300px;float:right;margin: 0;padding: 0;"> <div class="gcse-searchbox-only"></div> </div> <!-- search --> <div class="clear"></div> </div> </div> <div id="headerSub"> <!-- MEMBER HEADER ///////////////////////////////////////////////////// --> <div id="headerProfile"> <!-- Photo or Logo --> <div class='memPhoto'> <a href="https://circleid.com/members/1080"><img src="/images/member_photos/photo_1080.jpg" width="80" border="0" alt="Ram Mohan" /></a> </div> <!-- Info --> <div class="memInfo"> <h3>Ram Mohan</h3> <p> <strong>Chief Operating Officer at Afilias</strong><br /> Joined on August 5, 2004<br/> Total Post Views: 771,604 </p> <table class="btn-container"><tr><td class="btl"></td><td class="btr"></td></tr><tr><td class="bbl"></td><td class="bbr"><a href="#" class="toggle-show" id="clickToggle">About</a></td></tr></table> </div> <!-- Buttons --> <div class="buttons"> <!-- Message --> <table class="btn-container"> <tr><td class="btl"></td><td class="btr"></td></tr> <tr><td class="bbl"></td><td class="bbr"><a href="https://circleid.com/account/email_console/1080/" class="email">Send Message</a></td></tr> </table> <!-- RSS --> <table class="btn-container"> <tr><td class="btl"></td><td class="btr"></td></tr> <tr><td class="bbl"></td><td class="bbr"><a href="https://circleid.com/rss/members/1080" class="rss">RSS</a></td></tr> </table> </div> <div class="clear"></div> </div> <!-- MEMBER SUB HEADER ///////////////////////////////////////////////////// --> <div id="headerSubProfile" class="showHideBox"> <div id="bio"> <p>Ram Mohan is the Chief Operating Officer at Afilias Limited where he manages the strategy and overall business direction of Afilias.</p> <p>Ram Mohan serves as the Security &amp; Stability Advisory Committee&#8217;s liaison to the Board of Directors of ICANN. He helped write the IDN Guidelines that has been widely adopted by registries worldwide and is an active participant in Internationalization efforts worldwide. He is a member of the ICANN Security &amp; Stability Committee (SSAC), and has served on four ICANN Nominating Committees (NomCom). Ram was the Chair of the ICANN GNSO Internationalized Domain Names Working Group and a member of the ICANN Whois task force. He sits on the boards of various educational and leadership organizations in the Philadelphia area.</p> <p>Ram helped guide Afilias from a startup firm in 2001 with $0 in revenues into the world&#8217;s largest domain name registry service provider, serving over 14 million domain names. He led the team that conducted the historic transition of the .ORG registry from VeriSign to the non-profit Public Interest Registry, and helped create the technology, business and policy foundations behind the successful .mobi and .asia top level domains and the launch of the .me domain in 2008. In 2004, Ram and his company were appointed as a technology advisor to the Indian Government to liberalize the .IN country code domain name. Working in close coordination with government, industry and civil society, Ram led the team responsible for the transformation of the .IN domain from 7,000 names registered at the start of 2005 to over 500,000 names in 2008.</p> <p>Afilias, based in Ireland with offices in the US, Canada, India, UK and Germany, is the registry operator for the .INFO and .AERO domains, the registry services provider for the .ORG, .MOBI and .ASIA domains and 8 sovereign country domains (ccTLDs).</p> <p>The opinions posted here are Ram&#8217;s and not those of Afilias.</p> </div> <div id="links" class="pipedLinks"> <ul> </ul> </div> <p id="cc"> Except where otherwise noted, all postings by Ram Mohan on CircleID are licensed under a <a rel="license" href="http://creativecommons.org/licenses/ by-nc-nd /2.5/" class="blue">Creative Commons License</a>. </p> </div> <!-- MEMBER SUB NAV ///////////////////////////////////////////////////// --> <div id="headerSubNav"> <ul> <li id="current"><a href="https://circleid.com/members/1080">Featured Blogs (36)</a></li> <li ><a href="https://circleid.com/members/1080/comments/">Comments (120)</a></li> </ul> <div class="clear"></div> </div> </div> <!-- MEMBER POSTS ///////////////////////////////////////////////////// --> <div class="container2c"> <div class="colWrapper"> <div class="colA"> <div class="colPad"> <h2>Featured Blogs</h2> <div class="postList" style="padding-bottom:30px;"> <h3 style="padding-top:0;margin-top:0;border:none;"><a href="https://circleid.com/posts/20200520-covid-domain-registrations-surged-in-march">COVID Domain Registrations Surged in March</a></h3> <div class="byLine">Related Topics: <a href="/topics/coronavirus" class="red">Coronavirus</a>,&nbsp; <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/dns" class="red">DNS</a>,&nbsp; <a href="/topics/domain-management" class="red">Domain Management</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,&nbsp; <a href="/topics/new_tlds" class="red">New TLDs</a>,&nbsp; <a href="/topics/threat-intelligence" class="red">Threat Intelligence</a>,</div> <p> The Internet and the domain name system (DNS) have become the mainstay of the new COVID sheltered world. Afilias looked at registrations in the unrestricted domain name space, with a special focus on the popular .INFO, .PRO, .MOBI and .IO domain name extensions. The data shows that the number of website and domain registrations related to COVID and Coronavirus in these extensions is flattening after a surge in March.&nbsp;<a href="https://circleid.com/posts/20200520-covid-domain-registrations-surged-in-march" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/1080" class="blue">Ram Mohan</a></li> <li>May 20, 2020</li> <li>Comments: 0</li> <li>Views: 11,938</li> </ul> </div> <h3><a href="https://circleid.com/posts/20200421-remote-work-demands-encryption">Remote Work Demands Encryption</a></h3> <div class="byLine">Related Topics: <a href="/topics/coronavirus" class="red">Coronavirus</a>,&nbsp; <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/dns" class="red">DNS</a>,&nbsp; <a href="/topics/dns-security" class="red">DNS Security</a>,&nbsp; <a href="/topics/threat-intelligence" class="red">Threat Intelligence</a>,</div> <p> Now that we are all working from home (WFH), the need for encryption must also increase in priority and awareness. Zoom's popular video conferencing solution got in hot water because they promised "end-to-end" encryption but didn't deliver on it - prompting some organizations to ban it from use altogether. Encryption protects confidential information from being exposed in transmission, providing a secure way for the intended recipient to get the information without snooping by others.&nbsp;<a href="https://circleid.com/posts/20200421-remote-work-demands-encryption" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/1080" class="blue">Ram Mohan</a></li> <li>Apr 21, 2020</li> <li>Comments: 0</li> <li>Views: 8,106</li> </ul> </div> <h3><a href="https://circleid.com/posts/20200409-new-cyberthreats-have-you-been-exposed-at-home">New Cyberthreats: Have You Been Exposed at Home?</a></h3> <div class="byLine">Related Topics: <a href="/topics/brand_protection" class="red">Brand Protection</a>,&nbsp; <a href="/topics/coronavirus" class="red">Coronavirus</a>,&nbsp; <a href="/topics/cyberattack" class="red">Cyberattack</a>,&nbsp; <a href="/topics/cybercrime" class="red">Cybercrime</a>,&nbsp; <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,&nbsp; <a href="/topics/privacy" class="red">Privacy</a>,&nbsp; <a href="/topics/threat-intelligence" class="red">Threat Intelligence</a>,</div> <p> There are new threats that you may have already been exposed to. Here are some of the new threats and advice on how to protect yourself. During this pandemic, Zoom has emerged as a very popular teleconferencing choice for companies and educational institutions, but a new weakness for Zoom was also discovered. Some online conferences and classes that had not password protected their sessions fell victim to eavesdroppers using the screen sharing feature to "Zoom Bomb" those sessions with graphic images.&nbsp;<a href="https://circleid.com/posts/20200409-new-cyberthreats-have-you-been-exposed-at-home" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/1080" class="blue">Ram Mohan</a></li> <li>Apr 09, 2020</li> <li>Comments: 0</li> <li>Views: 8,154</li> </ul> </div> <h3><a href="https://circleid.com/posts/20190306_say_yes_to_dnssec">Say YES to DNSSEC</a></h3> <div class="byLine">Related Topics: <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/dns" class="red">DNS</a>,&nbsp; <a href="/topics/dns-security" class="red">DNS Security</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,&nbsp; <a href="/topics/icann" class="red">ICANN</a>,&nbsp; <a href="/topics/threat-intelligence" class="red">Threat Intelligence</a>,</div> <p> With the latest "DNSpionage" attack, ICANN astutely prompted domain name holders to fully deploy DNSSEC on their names. Afilias absolutely supports this and encourages the same. In this post, I remind you of why DNSSEC is important and our continued role. Afilias has a long history in the development and advocacy of DNSSEC. In 2007, we partnered with Public Interest Registry to help found dnssec-deployment.org.&nbsp;<a href="https://circleid.com/posts/20190306_say_yes_to_dnssec" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/1080" class="blue">Ram Mohan</a></li> <li>Mar 06, 2019</li> <li>Comments: 3</li> <li>Views: 9,907</li> </ul> </div> <h3><a href="https://circleid.com/posts/20190220_building_a_secure_global_network">Building a Secure Global Network</a></h3> <div class="byLine">Related Topics: <a href="/topics/cyberattack" class="red">Cyberattack</a>,&nbsp; <a href="/topics/cybercrime" class="red">Cybercrime</a>,&nbsp; <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/dns" class="red">DNS</a>,&nbsp; <a href="/topics/dns-security" class="red">DNS Security</a>,&nbsp; <a href="/topics/networks" class="red">Networks</a>,&nbsp; <a href="/topics/threat-intelligence" class="red">Threat Intelligence</a>,</div> <p> Recently, the DNS has come under an extensive attack. The so-called "DNSpionage" campaigns have brought to light the myriad methods used to infiltrate networks. These attacks employed phishing, system hopping via key exfiltration, and software zero day exploits, illustrating that many secure networks may not be fully protected.&nbsp;<a href="https://circleid.com/posts/20190220_building_a_secure_global_network" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/1080" class="blue">Ram Mohan</a></li> <li>Feb 20, 2019</li> <li>Comments: 0</li> <li>Views: 9,383</li> </ul> </div> <h3><a href="https://circleid.com/posts/20171019_equifax_breach_a_9_step_fraud_prevention_plan">Equifax Breach: 9 Fraud Prevention Steps Everyone Should Take</a></h3> <div class="byLine">Related Topics: <a href="/topics/cybercrime" class="red">Cybercrime</a>,&nbsp; <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/threat-intelligence" class="red">Threat Intelligence</a>,</div> <p> The U.S. Internet Revenue Service now says that criminals already had most of the information that credit bureau Equifax lost in a breach that revealed personal information about nearly 150 million people. The incident at Equifax and the IRS' mid-October admission of how much-stolen data was already in criminal hands may force changes in how the world handles personal information.&nbsp;<a href="https://circleid.com/posts/20171019_equifax_breach_a_9_step_fraud_prevention_plan" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/1080" class="blue">Ram Mohan</a></li> <li>Oct 19, 2017</li> <li>Comments: 0</li> <li>Views: 21,328</li> </ul> </div> <h3><a href="https://circleid.com/posts/20160929_maintaining_security_and_stability_in_the_internet_ecosystem">Maintaining Security and Stability in the Internet Ecosystem</a></h3> <div class="byLine">Related Topics: <a href="/topics/cyberattack" class="red">Cyberattack</a>,&nbsp; <a href="/topics/cybercrime" class="red">Cybercrime</a>,&nbsp; <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/ddos_attack" class="red">DDoS Attack</a>,&nbsp; <a href="/topics/malware" class="red">Malware</a>,&nbsp; <a href="/topics/threat-intelligence" class="red">Threat Intelligence</a>,</div> <p> DDoS attacks, phishing scams and malware. We battle these dark forces every day - and every day they get more sophisticated. But what worries me isn't just keeping up with them, it is keeping up with the sheer volume of devices and data that these forces can enlist in an attack. That's why we as an industry need to come together and share best practices - at the ICANN community, at the IETF and elsewhere - so collectively we are ready for the future.&nbsp;<a href="https://circleid.com/posts/20160929_maintaining_security_and_stability_in_the_internet_ecosystem" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/1080" class="blue">Ram Mohan</a></li> <li>Sep 29, 2016</li> <li>Comments: 3</li> <li>Views: 14,574</li> </ul> </div> <h3><a href="https://circleid.com/posts/20160721_developing_internet_of_things_building_blocks">Developing Internet of Things Building Blocks</a></h3> <div class="byLine">Related Topics: <a href="/topics/dns" class="red">DNS</a>,&nbsp; <a href="/topics/dns-security" class="red">DNS Security</a>,&nbsp; <a href="/topics/internet_of_things" class="red">Internet of Things</a>,&nbsp; <a href="/topics/ipv6-transition" class="red">IPv6 Transition</a>,</div> <p> <br /> The Internet is undergoing an evolutionary transformation resulting from the explosive growth of things that are interconnected. From single purpose sensors through wearable technologies to sophisticated computing devices, we are creating, exchanging, and consuming more data at rates that would have been inconceivable just a decade ago. The market suggests the average consumer believes this is the best world possible. As technologists, we have a responsibility to consider if we are building an Internet that is in the best interest of the user.&nbsp;<a href="https://circleid.com/posts/20160721_developing_internet_of_things_building_blocks" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/1080" class="blue">Ram Mohan</a></li> <li>Jul 21, 2016</li> <li>Comments: 1</li> <li>Views: 17,654</li> </ul> </div> <h3><a href="https://circleid.com/posts/20151104_help_cryptech_and_me_make_the_internet_more_secure">Help CrypTech (and Me) Make the Internet More Secure</a></h3> <div class="byLine">Related Topics: <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/privacy" class="red">Privacy</a>,&nbsp; <a href="/topics/threat-intelligence" class="red">Threat Intelligence</a>,</div> <p> Are you ready to help me make the Internet more secure? Here's your chance to join me in a project to create an open-source hardware device to protect email, files and other data from hackers and government spies. The CrypTech Project was founded in late 2013 after NSA whistleblower Edward Snowden revealed that the US and other governments were exploiting weak cryptography and loose standards to gain access to citizens' email, documents, and other files.&nbsp;<a href="https://circleid.com/posts/20151104_help_cryptech_and_me_make_the_internet_more_secure" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/1080" class="blue">Ram Mohan</a></li> <li>Nov 04, 2015</li> <li>Comments: 0</li> <li>Views: 11,160</li> </ul> </div> <h3><a href="https://circleid.com/posts/20150806_the_internet_of_things_when_sci_fi_becomes_reality">The Internet of Things: When Sci-Fi Becomes Reality</a></h3> <div class="byLine">Related Topics: <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/ddos_attack" class="red">DDoS Attack</a>,&nbsp; <a href="/topics/internet_of_things" class="red">Internet of Things</a>,&nbsp; <a href="/topics/networks" class="red">Networks</a>,&nbsp; <a href="/topics/threat-intelligence" class="red">Threat Intelligence</a>,</div> <p> In my last blog post I shared some of the general security challenges that come with the Internet of Things (IoT). In this post, I will focus on one particular security risk: distributed denial of service (DDoS) attacks. Even before the age of IoT, DDoS attacks have been turning multitudes of computers into botnets, attacking a single target and causing denial of services for the target's users. By "multitudes" we can be talking about thousands or even millions of victim devices. Now add IoT into the equation...&nbsp;<a href="https://circleid.com/posts/20150806_the_internet_of_things_when_sci_fi_becomes_reality" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/1080" class="blue">Ram Mohan</a></li> <li>Aug 06, 2015</li> <li>Comments: 0</li> <li>Views: 18,363</li> </ul> </div> <h3><a href="https://circleid.com/posts/20150602_internet_of_things_solving_security_challenges">The Internet of Things: Solving Security Challenges from the Fringe to the Core</a></h3> <div class="byLine">Related Topics: <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/dns-security" class="red">DNS Security</a>,&nbsp; <a href="/topics/internet_of_things" class="red">Internet of Things</a>,&nbsp; <a href="/topics/networks" class="red">Networks</a>,&nbsp; <a href="/topics/threat-intelligence" class="red">Threat Intelligence</a>,</div> <p> News flash: to help fight California's drought, Samsung is offering a $100,000 prize to the innovator who creates "the most effective use of IoT and ARTIK [Samsung's IoT platform] technology for reducing water consumption by individuals or municipalities." When the average reader of this news headline needs no explanation of what "IoT" means or what this contest is about, we know IoT, or the Internet of Things, is for real. There are already an estimated 25 billion connected devices around the world, according to expert estimates.&nbsp;<a href="https://circleid.com/posts/20150602_internet_of_things_solving_security_challenges" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/1080" class="blue">Ram Mohan</a></li> <li>Jun 02, 2015</li> <li>Comments: 0</li> <li>Views: 16,134</li> </ul> </div> <h3><a href="https://circleid.com/posts/20141208_which_domains_stand_the_strongest_against_phishing_attacks">Which Domains Stand the Strongest Against Phishing Attacks?</a></h3> <div class="byLine">Related Topics: <a href="/topics/cyberattack" class="red">Cyberattack</a>,&nbsp; <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/new_tlds" class="red">New TLDs</a>,&nbsp; <a href="/topics/threat-intelligence" class="red">Threat Intelligence</a>,</div> <p> The latest Anti-Phishing Working Group (APWG) Global Phishing Survey, which analyzed over 100,000 phishing attacks in the first half of 2014, examines the progress that top level domains (TLDs) are making in responding to phishing attacks that use their TLDs. The report finds the .INFO domain has the lowest average phishing uptimes as compared to other TLDs, such as .COM and .NET.&nbsp;<a href="https://circleid.com/posts/20141208_which_domains_stand_the_strongest_against_phishing_attacks" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/1080" class="blue">Ram Mohan</a></li> <li>Dec 08, 2014</li> <li>Comments: 9</li> <li>Views: 20,118</li> </ul> </div> <h3><a href="https://circleid.com/posts/20140904_dot_bharat_brings_the_promise_of_a_new_digital_india">.???? Brings the Promise of a New Digital India</a></h3> <div class="byLine">Related Topics: <a href="/topics/dns" class="red">DNS</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,&nbsp; <a href="/topics/multilinguism" class="red">Multilinguism</a>,&nbsp; <a href="/topics/new_tlds" class="red">New TLDs</a>,&nbsp; <a href="/topics/registry_services" class="red">Registry Services</a>,</div> <p> On August 27, 2014, the world became a bit more connected as the Internet welcomed more than 400 million Hindi language speakers in their own language. .???? (.Bharat), which means India in the Hindi language, was inaugurated on August 27 in New Delhi by Mr. Ravi Shankar Prasad, India's Minister of Law & Justice and Communications & Information Technology.&nbsp;<a href="https://circleid.com/posts/20140904_dot_bharat_brings_the_promise_of_a_new_digital_india" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/1080" class="blue">Ram Mohan</a></li> <li>Sep 04, 2014</li> <li>Comments: 0</li> <li>Views: 16,390</li> </ul> </div> <h3><a href="https://circleid.com/posts/20140207_more_problems_crop_up_universal_acceptance_of_top_level_domains">More Problems Crop Up With Universal Acceptance of Top Level Domains</a></h3> <div class="byLine">Related Topics: <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/dns" class="red">DNS</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,&nbsp; <a href="/topics/icann" class="red">ICANN</a>,&nbsp; <a href="/topics/new_tlds" class="red">New TLDs</a>,&nbsp; <a href="/topics/threat-intelligence" class="red">Threat Intelligence</a>,</div> <p> I've often found truth in the famous George Santayana quote, "Those that cannot remember the past are doomed to repeat it." That's an apt warning for what is currently happening - again - with the hundreds of new generic Top Level Domains (gTLDs) that are launching ... and failing to work as expected on the Internet. First, a quick refresher: As most CircleID readers know, in the early 2000s, seven new gTLDs were launched: .AERO, .BIZ, .COOP, .INFO, .MUSEUM, .NAME and .PRO. Aside from Country Code TLDs (ccTLDs), these were the first top-level changes to the DNS since the early days of the Internet.&nbsp;<a href="https://circleid.com/posts/20140207_more_problems_crop_up_universal_acceptance_of_top_level_domains" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/1080" class="blue">Ram Mohan</a></li> <li>Feb 07, 2014</li> <li>Comments: 3</li> <li>Views: 37,239</li> </ul> </div> <h3><a href="https://circleid.com/posts/20121207_2012_global_phishing_trends_uptime_down_numbers_up">2012 Global Phishing Trends: Uptime Down, Numbers Up</a></h3> <div class="byLine">Related Topics: <a href="/topics/dns-security" class="red">DNS Security</a>,</div> <p> Despite security advances over the past year, including the increased deployment of DNSSEC, pirates continue to wreak havoc on the Internet. But before you decide that Internet security innovations are futile, consider this: online criminals are just like burglars in the physical world; they don't take new ways of blocking their best efforts lying down. They come up with new and, in some cases, stronger plans of attack.&nbsp;<a href="https://circleid.com/posts/20121207_2012_global_phishing_trends_uptime_down_numbers_up" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/1080" class="blue">Ram Mohan</a></li> <li>Dec 07, 2012</li> <li>Comments: 0</li> <li>Views: 13,862</li> </ul> </div> <h3><a href="https://circleid.com/posts/20120813_mobile_users_now_and_in_the_future_a_snapshot">Mobile Users Now and in the Future: A Snapshot</a></h3> <div class="byLine">Related Topics: <a href="/topics/mobile_internet" class="red">Mobile Internet</a>,&nbsp; <a href="/topics/web" class="red">Web</a>,</div> <p> Like many of us in the technology industry, I am captivated by the growing adoption of mobile. It's changing multiple industries at a pace that would have seemed impossible just a few years ago. And my own interest accelerated when Afilias acquired another Irish company named dotMobi. ...since a mobile domain is not useful without mobile sites, dotMobi developed a site-building tool called goMobi that is used globally by hundreds of thousands of site owners. Because of that, we have unique information about who is using the mobile Web, and how they're using it.&nbsp;<a href="https://circleid.com/posts/20120813_mobile_users_now_and_in_the_future_a_snapshot" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/1080" class="blue">Ram Mohan</a></li> <li>Aug 13, 2012</li> <li>Comments: 0</li> <li>Views: 12,683</li> </ul> </div> <h3><a href="https://circleid.com/posts/20120405_slowly_cracking_the_dnssec_code_at_icann_43">Slowly Cracking the DNSSEC Code at ICANN 43</a></h3> <div class="byLine">Related Topics: <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/dns" class="red">DNS</a>,&nbsp; <a href="/topics/dns-security" class="red">DNS Security</a>,&nbsp; <a href="/topics/icann" class="red">ICANN</a>,</div> <p> As regular readers know, ICANN holds lengthy, in-depth discussions devoted to DNSSEC at each of its three annual meetings. The half-day session held at ICANN 43 in Costa Rica last month was particularly interesting. What became clear is that the industry is quickly moving into the end-user adoption phase of global DNSSEC deployment.&nbsp;<a href="https://circleid.com/posts/20120405_slowly_cracking_the_dnssec_code_at_icann_43" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/1080" class="blue">Ram Mohan</a></li> <li>Apr 05, 2012</li> <li>Comments: 0</li> <li>Views: 14,269</li> </ul> </div> <h3><a href="https://circleid.com/posts/20120322_nasa_teething_troubles_teach_a_dnssec_lesson">NASA Teething Troubles Teach a DNSSEC Lesson</a></h3> <div class="byLine">Related Topics: <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/dns" class="red">DNS</a>,&nbsp; <a href="/topics/dns-security" class="red">DNS Security</a>,&nbsp; <a href="/topics/threat-intelligence" class="red">Threat Intelligence</a>,</div> <p> On January 18, 2012, Comcast customers found they could not access the NASA.gov website. Some users assumed that Comcast was deliberately blocking the website or that NASA, like Wikipedia and Reddit, was participating in the "blackout" protests against the Stop Online Piracy Act (SOPA) going on that day. As it turned out, the truth was much less exciting, but it offers important lessons about DNSSEC.&nbsp;<a href="https://circleid.com/posts/20120322_nasa_teething_troubles_teach_a_dnssec_lesson" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/1080" class="blue">Ram Mohan</a></li> <li>Mar 22, 2012</li> <li>Comments: 3</li> <li>Views: 15,881</li> </ul> </div> <h3><a href="https://circleid.com/posts/20111130_dnssec_update_from_icann_42_in_dakar">DNSSEC Update from ICANN 42 in Dakar</a></h3> <div class="byLine">Related Topics: <a href="/topics/access_providers" class="red">Access Providers</a>,&nbsp; <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/dns" class="red">DNS</a>,&nbsp; <a href="/topics/dns-security" class="red">DNS Security</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,&nbsp; <a href="/topics/icann" class="red">ICANN</a>,</div> <p> While the global rollout of DNSSEC continues at the domain name registry level - with more than 25% of top-level domains now signed - the industry continues to focus on the problem of registrar, ISP and ultimately end-user adoption. At the ICANN meeting in Dakar in late October, engineers from some of the early-adopting registries gathered for their regular face-to-face discussion about how to break the "chicken or egg" problems of secure domain name deployment.&nbsp;<a href="https://circleid.com/posts/20111130_dnssec_update_from_icann_42_in_dakar" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/1080" class="blue">Ram Mohan</a></li> <li>Nov 30, 2011</li> <li>Comments: 0</li> <li>Views: 22,699</li> </ul> </div> <h3><a href="https://circleid.com/posts/20110729_dnssec_baby_steps_reported_at_icann_41">DNSSEC Baby Steps Reported at ICANN 41</a></h3> <div class="byLine">Related Topics: <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/dns" class="red">DNS</a>,&nbsp; <a href="/topics/dns-security" class="red">DNS Security</a>,&nbsp; <a href="/topics/icann" class="red">ICANN</a>,&nbsp; <a href="/topics/new_tlds" class="red">New TLDs</a>,</div> <p> The Internet is slowly beginning to adopt the new DNSSEC domain names standard, but significant challenges remain. That was the main takeaway from a four-hour workshop on the technology held during the recent ICANN 41 public meeting in Singapore, which heard from many domain registries, registrars and other infrastructure providers.&nbsp;<a href="https://circleid.com/posts/20110729_dnssec_baby_steps_reported_at_icann_41" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/1080" class="blue">Ram Mohan</a></li> <li>Jul 29, 2011</li> <li>Comments: 0</li> <li>Views: 13,983</li> </ul> </div> <h3><a href="https://circleid.com/posts/20110412_beyond_the_top_level_dnssec_deployment_at_icann_40">Beyond the Top Level: DNSSEC Deployment at ICANN 40</a></h3> <div class="byLine">Related Topics: <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/dns" class="red">DNS</a>,&nbsp; <a href="/topics/dns-security" class="red">DNS Security</a>,&nbsp; <a href="/topics/icann" class="red">ICANN</a>,&nbsp; <a href="/topics/new_tlds" class="red">New TLDs</a>,&nbsp; <a href="/topics/registry_services" class="red">Registry Services</a>,</div> <p> I recently wrote about the encouraging level of DNSSEC adoption among top-level domain name registries, and noted that adoption at the second level and in applications is an important next step for adding more security to the DNS. The root and approximately 20 percent of the top level domains are now signed; it is time for registrars and recursive DNS servers operated by the ISPs to occupy center stage.&nbsp;<a href="https://circleid.com/posts/20110412_beyond_the_top_level_dnssec_deployment_at_icann_40" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/1080" class="blue">Ram Mohan</a></li> <li>Apr 12, 2011</li> <li>Comments: 0</li> <li>Views: 13,848</li> </ul> </div> <h3><a href="https://circleid.com/posts/20110321_dnssec_deployment_reaching_critical_mass">DNSSEC Deployment Reaching Critical Mass</a></h3> <div class="byLine">Related Topics: <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/dns" class="red">DNS</a>,&nbsp; <a href="/topics/dns-security" class="red">DNS Security</a>,&nbsp; <a href="/topics/icann" class="red">ICANN</a>,&nbsp; <a href="/topics/new_tlds" class="red">New TLDs</a>,</div> <p> Less than nine months after the DNS root was signed, the rollout of DNSSEC across the Internet's top-level domains is approaching the tipping point. Thanks to the combined efforts of registries around the world, the new security protocol will soon be available to the majority of domain name registrants in almost a quarter of all TLDs.&nbsp;<a href="https://circleid.com/posts/20110321_dnssec_deployment_reaching_critical_mass" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/1080" class="blue">Ram Mohan</a></li> <li>Mar 21, 2011</li> <li>Comments: 7</li> <li>Views: 32,740</li> </ul> </div> <h3><a href="https://circleid.com/posts/20101217_industry_makes_rapid_progress_on_dnssec">Industry Makes Rapid Progress on DNSSEC</a></h3> <div class="byLine">Related Topics: <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/dns" class="red">DNS</a>,&nbsp; <a href="/topics/dns-security" class="red">DNS Security</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,&nbsp; <a href="/topics/icann" class="red">ICANN</a>,&nbsp; <a href="/topics/malware" class="red">Malware</a>,&nbsp; <a href="/topics/new_tlds" class="red">New TLDs</a>,&nbsp; <a href="/topics/registry_services" class="red">Registry Services</a>,</div> <p> DNSSEC is being rolled out quickly in top-level domain registries around the world, but there's still some way to go to encourage other Internet stakeholders to adopt the new security technology. That was one of the key takeaways from a day-long, comprehensive session on Domain Name System Security Extensions implementation worldwide, held during ICANN's public meeting in Cartagena, Colombia, last week.&nbsp;<a href="https://circleid.com/posts/20101217_industry_makes_rapid_progress_on_dnssec" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/1080" class="blue">Ram Mohan</a></li> <li>Dec 17, 2010</li> <li>Comments: 0</li> <li>Views: 12,658</li> </ul> </div> <h3><a href="https://circleid.com/posts/20100929_will_us_government_directives_spur_ipv6_adoption">Will US Government Directives Spur IPv6 Adoption?</a></h3> <div class="byLine">Related Topics: <a href="/topics/ipv6-transition" class="red">IPv6 Transition</a>,&nbsp; <a href="/topics/ipv4-markets" class="red"> IPv4 Markets</a>,&nbsp; <a href="/topics/networks" class="red">Networks</a>,</div> <p> Yesterday, the National Telecommunications and Information Administration of the U.S. government hosted a workshop discussing the state of IPv6 in the United States and its impact on industry, government, and the Internet economy. I was asked to be a panelist, along with industry executives from ARIN, ISOC, ICANN, Comcast, Akamai, Verizon, Google, VeriSign, DOE, NIST, and DREN. Moderated by Aneesh Chopra, Chief Technology Officer of the United States and Vivek Kundra, Chief Information Officer of the United States, this was the first event in the past few years to truly shine a spotlight on IPv6 adoption (or lack thereof) and introduce key directives to move this issue forward.&nbsp;<a href="https://circleid.com/posts/20100929_will_us_government_directives_spur_ipv6_adoption" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/1080" class="blue">Ram Mohan</a></li> <li>Sep 29, 2010</li> <li>Comments: 6</li> <li>Views: 18,889</li> </ul> </div> <h3><a href="https://circleid.com/posts/three_things_registrars_must_do_to_enhance_security">Three Things Registrars Must Do to Enhance Security</a></h3> <div class="byLine">Related Topics: <a href="/topics/cybercrime" class="red">Cybercrime</a>,&nbsp; <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,&nbsp; <a href="/topics/threat-intelligence" class="red">Threat Intelligence</a>,</div> <p> If the rise of phishing has taught us anything, it's that on the Internet, if a digital asset has value, there's somebody out there who wants to steal it. Whether it's a bank account password, a credit card number, a PayPal login, or even a magic sword in an online game, there's a fraudster somewhere trying to misappropriate it for his or her own nefarious purposes. Domain names have always been a target for such criminals.&nbsp;<a href="https://circleid.com/posts/three_things_registrars_must_do_to_enhance_security" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/1080" class="blue">Ram Mohan</a></li> <li>Aug 09, 2010</li> <li>Comments: 4</li> <li>Views: 12,870</li> </ul> </div> <h3><a href="https://circleid.com/posts/20100716_july_2010_the_end_of_the_beginning_for_dnssec">July 2010: The End of the Beginning for DNSSEC</a></h3> <div class="byLine">Related Topics: <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/dns" class="red">DNS</a>,&nbsp; <a href="/topics/dns-security" class="red">DNS Security</a>,&nbsp; <a href="/topics/networks" class="red">Networks</a>,</div> <p> July 15, 2010 (yesterday) marked the end of the beginning for DNSSEC, as the DNS root was cryptographically signed. For nearly two decades, security researchers, academics and Internet leaders have worked to develop and deploy Domain Name System Security Extensions (DNSSEC). DNSSEC was developed to improve the overall security of the DNS, a need which was dramatized by the discovery of the Kaminsky bug a few years ago.&nbsp;<a href="https://circleid.com/posts/20100716_july_2010_the_end_of_the_beginning_for_dnssec" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/1080" class="blue">Ram Mohan</a></li> <li>Jul 16, 2010</li> <li>Comments: 0</li> <li>Views: 14,599</li> </ul> </div> <h3><a href="https://circleid.com/posts/20100623_dnssec_becomes_a_reality_today_at_icann_brussels">DNSSEC Becomes a Reality Today at ICANN Brussels</a></h3> <div class="byLine">Related Topics: <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/dns" class="red">DNS</a>,&nbsp; <a href="/topics/dns-security" class="red">DNS Security</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,&nbsp; <a href="/topics/icann" class="red">ICANN</a>,&nbsp; <a href="/topics/new_tlds" class="red">New TLDs</a>,&nbsp; <a href="/topics/registry_services" class="red">Registry Services</a>,&nbsp; <a href="/topics/threat-intelligence" class="red">Threat Intelligence</a>,</div> <p> Attendees at the public ICANN meeting in Brussels today heard from over two dozen companies that have implemented or are planning to support DNSSEC, the next-generation standard protocol for secured domain names. It is clearer than ever before that DNSSEC is becoming a reality.&nbsp;<a href="https://circleid.com/posts/20100623_dnssec_becomes_a_reality_today_at_icann_brussels" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/1080" class="blue">Ram Mohan</a></li> <li>Jun 23, 2010</li> <li>Comments: 0</li> <li>Views: 13,127</li> </ul> </div> <h3><a href="https://circleid.com/posts/20100517_more_stepping_stones_before_this_summers_seminal_dnssec_events">More Stepping Stones Before This Summer&#8217;s Seminal DNSSEC Events</a></h3> <div class="byLine">Related Topics: <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/dns" class="red">DNS</a>,&nbsp; <a href="/topics/dns-security" class="red">DNS Security</a>,&nbsp; <a href="/topics/new_tlds" class="red">New TLDs</a>,&nbsp; <a href="/topics/registry_services" class="red">Registry Services</a>,&nbsp; <a href="/topics/threat-intelligence" class="red">Threat Intelligence</a>,</div> <p> The deployment of Domain Security Extensions (DNSSEC) has crossed another milestone this month with the publication of DURZ (deliberately unvalidatable root zone) in all DNS root servers on 5 May 2010. While this change was virtually invisible to most Internet users, this event and the remaining testing that will occur over these next two months will dictate the ultimate success of DNSSEC deployment across the Internet.&nbsp;<a href="https://circleid.com/posts/20100517_more_stepping_stones_before_this_summers_seminal_dnssec_events" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/1080" class="blue">Ram Mohan</a></li> <li>May 17, 2010</li> <li>Comments: 0</li> <li>Views: 14,096</li> </ul> </div> <h3><a href="https://circleid.com/posts/20100414_dnssec_no_longer_pie_in_the_sky_time_to_develop_a_strategy">DNSSEC No Longer Pie-in-the-Sky: Time to Develop a Strategy</a></h3> <div class="byLine">Related Topics: <a href="/topics/access_providers" class="red">Access Providers</a>,&nbsp; <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/dns" class="red">DNS</a>,&nbsp; <a href="/topics/dns-security" class="red">DNS Security</a>,&nbsp; <a href="/topics/networks" class="red">Networks</a>,&nbsp; <a href="/topics/registry_services" class="red">Registry Services</a>,</div> <p> You may have seen media reports a few weeks ago describing how servers behind the so-called Great Firewall of China were found delivering incorrect DNS information to users in the rest of the world, thereby redirecting users to edited Web pages. Reports indicate that this apparently occurred due to a caching error by a single Internet Service Provider. While the problem was fairly limited in scope, it could have entirely been prevented in a world where DNSSEC was fully deployed.&nbsp;<a href="https://circleid.com/posts/20100414_dnssec_no_longer_pie_in_the_sky_time_to_develop_a_strategy" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/1080" class="blue">Ram Mohan</a></li> <li>Apr 14, 2010</li> <li>Comments: 0</li> <li>Views: 21,987</li> </ul> </div> <h3><a href="https://circleid.com/posts/20091218_you_dont_need_to_hack_twitter_site_to_control_traffic_email">You Don&#8217;t Need to Hack Twitter.com to Control All Its Traffic and Email</a></h3> <div class="byLine">Related Topics: <a href="/topics/cyberattack" class="red">Cyberattack</a>,&nbsp; <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/dns" class="red">DNS</a>,&nbsp; <a href="/topics/dns-security" class="red">DNS Security</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,&nbsp; <a href="/topics/icann" class="red">ICANN</a>,&nbsp; <a href="/topics/registry_services" class="red">Registry Services</a>,&nbsp; <a href="/topics/threat-intelligence" class="red">Threat Intelligence</a>,</div> <p> A big security news event last night and today is that the Twitter.com Web site was hacked and content on the site replaced. TechCrunch reported it and it has been picked up globally. But - was the Twitter.com website really hacked? We now know it was not so. There are four ways that users typing in Twitter.com would have seen the Iranian Cyber Army page.&nbsp;<a href="https://circleid.com/posts/20091218_you_dont_need_to_hack_twitter_site_to_control_traffic_email" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/1080" class="blue">Ram Mohan</a></li> <li>Dec 18, 2009</li> <li>Comments: 1</li> <li>Views: 31,438</li> </ul> </div> <h3><a href="https://circleid.com/posts/domain_tasting_target_of_us_federal_cybersquatting_lawsuit">Domain Tasting Target of US Federal Cybersquatting Lawsuit</a></h3> <div class="byLine">Related Topics: <a href="/topics/cybercrime" class="red">Cybercrime</a>,&nbsp; <a href="/topics/dns" class="red">DNS</a>,&nbsp; <a href="/topics/domain-management" class="red">Domain Management</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,&nbsp; <a href="/topics/icann" class="red">ICANN</a>,&nbsp; <a href="/topics/new_tlds" class="red">New TLDs</a>,</div> <p> So Domain Tasting, where registrants (who may also be registrars) taste names and keep only those that have economic value, is now the target of a federal cybersquatting lawsuit, brought about by lawyers for major brand name retailers Neiman Marcus and Bergdorf Goodman against major domain name registrar <a href="http://www.dotster.com/" title="Dotster">Dotster</a>. This Dotster lawsuit involves allegations of cybersquatting by registrars who use the Create Grace Period, which is mandated by <a href="http://www.icann.org" title="ICANN">ICANN</a> for global registries...&nbsp;<a href="https://circleid.com/posts/domain_tasting_target_of_us_federal_cybersquatting_lawsuit" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/1080" class="blue">Ram Mohan</a></li> <li>Jun 03, 2006</li> <li>Comments: 77</li> <li>Views: 117,987</li> </ul> </div> <h3><a href="https://circleid.com/posts/itu_launches_idn_survey_and_cctld_outreach">ITU Launches IDN Survey and ccTLD Outreach</a></h3> <div class="byLine">Related Topics: <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/dns" class="red">DNS</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,&nbsp; <a href="/topics/icann" class="red">ICANN</a>,&nbsp; <a href="/topics/multilinguism" class="red">Multilinguism</a>,&nbsp; <a href="/topics/new_tlds" class="red">New TLDs</a>,</div> <p> Today, the ITU <a href="http://www.itu.int/osg/spu/newslog/Study+Group+17+Questionnaire+On+Information+About+Experiences+On+The+Use+Of+IDN.aspx" title="launched a new survey">launched a new survey</a> asking member states, ccTLDs and other ITU member organizations to provide answers to a specialized questionnaire asking for their experiences on the use of IDNs. The <a href="http://www.itu.int/home/index.html" title="the ITU">ITU</a> states that it is reaching out to ccTLDs to "collect information and experiences on Internationalized Domain Names under ccTLD (country code Top Level Domain) around the globe." One of the goals of this survey is to collate information on the "needs and practices" of each ccTLD that is surveyed -- so as to compile a report from the ITU that speaks to the implementation of IDNs around the world...&nbsp;<a href="https://circleid.com/posts/itu_launches_idn_survey_and_cctld_outreach" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/1080" class="blue">Ram Mohan</a></li> <li>Jun 01, 2006</li> <li>Comments: 13</li> <li>Views: 30,806</li> </ul> </div> <h3><a href="https://circleid.com/posts/finding_good_icann_board_candidates">Finding Good ICANN Board Candidates</a></h3> <div class="byLine">Related Topics: <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/dns" class="red">DNS</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,&nbsp; <a href="/topics/icann" class="red">ICANN</a>,&nbsp; <a href="/topics/new_tlds" class="red">New TLDs</a>,</div> <p> In the late summer of 2006, the ICANN Nominating Committee will convene to select three members to the ICANN Board of Directors, and four members to various councils. Depending on the global visibility of the nominees, and the current political and technical currents pulling at the Internet community, these nominations will be both pilloried and lauded in different circles. This process of selecting a good ICANN board member is astonishingly complex; I should know, having served on the founding NomCom in 2003, and the succeeding NomComs in 2004 and 2005. By far the biggest challenge is <em>finding</em> good candidates...&nbsp;<a href="https://circleid.com/posts/finding_good_icann_board_candidates" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/1080" class="blue">Ram Mohan</a></li> <li>Apr 10, 2006</li> <li>Comments: 3</li> <li>Views: 18,221</li> </ul> </div> <h3><a href="https://circleid.com/posts/the_problem_with_wikis">The Problem With Wikis</a></h3> <div class="byLine">Related Topics: <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/dns" class="red">DNS</a>,&nbsp; <a href="/topics/icann" class="red">ICANN</a>,&nbsp; <a href="/topics/threat-intelligence" class="red">Threat Intelligence</a>,</div> <p> Wikis have been around for a <a href="http://c2.com/cgi/wiki" title="long time">long time</a> on the Web. It's taken a while for them to transform from geek tool to a mainstream word, but we're here now. Last week at the <a href="http://www.icannvancouver.ca/" title="ICANN Meeting in Vancouver">ICANN Meeting in Vancouver</a>, it was fun to watch hundreds of people get introduced to Wikis and start using them, thanks to <a href="http://www.icannwiki.com/index.php/Raymond_King" title="Ray King's">Ray</a> King's <a href="http://www.icannwiki.com" title="ICANN Wiki">ICANN Wiki</a> project. In the past few days since, I've come to believe that Wikis are doomed unless they start thinking about security in a more serious way.&nbsp;<a href="https://circleid.com/posts/the_problem_with_wikis" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/1080" class="blue">Ram Mohan</a></li> <li>Dec 06, 2005</li> <li>Comments: 12</li> <li>Views: 42,612</li> </ul> </div> <h3><a href="https://circleid.com/posts/nomcom_appoints_independent_diverse_candidates_to_icann">Nom-Com Appoints Independent and Diverse Candidates to ICANN Leadership Positions</a></h3> <div class="byLine">Related Topics: <a href="/topics/cybersecurity" class="red">Cybersecurity</a>,&nbsp; <a href="/topics/dns" class="red">DNS</a>,&nbsp; <a href="/topics/icann" class="red">ICANN</a>,&nbsp; <a href="/topics/internet_governance" class="red">Internet Governance</a>,&nbsp; <a href="/topics/multilinguism" class="red">Multilinguism</a>,&nbsp; <a href="/topics/new_tlds" class="red">New TLDs</a>,&nbsp; <a href="/topics/privacy" class="red">Privacy</a>,&nbsp; <a href="/topics/threat-intelligence" class="red">Threat Intelligence</a>,</div> <p> When 72 candidates vie for 8 positions, making tough choices are inevitable. ICANN's 2005 Nominating Committee (Nom-Com) on Friday <a href="http://www.icann.org/announcements/announcement-04nov05.htm">announced the selection</a> of a diverse and independent set of <a href="http://www.icann.org/committees/nom-comm/candidate-bios-2005.htm">nominees</a> for important roles in ICANN, including the <a href="http://www.icann.org/general/board.html">Board of Directors</a>, the Generic Names Supporting Organization (<a href="http://gnso.icann.org/">GNSO</a>), the At-Large Advisory Council (<a href="http://alac.icann.org/">ALAC</a>) and the Country Code Names Supporting Organization (<a href="http://ccnso.icann.org/">ccNSO</a>).&nbsp;<a href="https://circleid.com/posts/nomcom_appoints_independent_diverse_candidates_to_icann" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/1080" class="blue">Ram Mohan</a></li> <li>Nov 06, 2005</li> <li>Comments: 7</li> <li>Views: 19,464</li> </ul> </div> <h3><a href="https://circleid.com/posts/how_indias_in_domain_rouses_from_its_slumber">How India&#8217;s .IN Domain Rouses from its Slumber</a></h3> <div class="byLine">Related Topics: <a href="/topics/dns" class="red">DNS</a>,&nbsp; <a href="/topics/domain_names" class="red">Domain Names</a>,&nbsp; <a href="/topics/new_tlds" class="red">New TLDs</a>,</div> <p> India is one of the world's fastest growing economies, the global leader in outsourcing and the service computing, and home to over a billion people. But when I first met officials from the Indian government to discuss their plans for .IN, India had a total of just about 7,000 .IN registrations, fewer than most small countries have. ...(Compare to 100,000 names registered last month alone) This is one of the most rapid starts of any domain worldwide. In my conversations with senior officials of the Indian Government and the National Internet Exchange of India (NIXI) which manages the .IN Registry, they credited three key decisions that proved critical to the success of the domain's re-launch...&nbsp;<a href="https://circleid.com/posts/how_indias_in_domain_rouses_from_its_slumber" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By&nbsp;<a href="https://circleid.com/members/1080" class="blue">Ram Mohan</a></li> <li>Mar 31, 2005</li> <li>Comments: 19</li> <li>Views: 42,437</li> </ul> </div> </div> </div> </div> </div> <div class="colB"> <div class="colPad"> <!-- TOPIC INTERESTS --> <h2 style="margin-bottom:10px;">Topic Interests</h2> <div style="padding:0 0 30px 0;line-height:20px;"> <a href="https://circleid.com/topicsdns"><strong>DNS</strong></a>,&nbsp; <a href="https://circleid.com/topicsnew_tlds"><strong>New TLDs</strong></a>,&nbsp; <a href="https://circleid.com/topicsdomain_names"><strong>Domain Names</strong></a>,&nbsp; <a href="https://circleid.com/topicsprivacy"><strong>Privacy</strong></a>,&nbsp; <a href="https://circleid.com/topicscybersecurity"><strong>Cybersecurity</strong></a>,&nbsp; <a href="https://circleid.com/topicsinternet_governance"><strong>Internet Governance</strong></a>,&nbsp; <a href="https://circleid.com/topicsmultilinguism"><strong>Multilinguism</strong></a>,&nbsp; <a href="https://circleid.com/topicsicann"><strong>ICANN</strong></a>,&nbsp; <a href="https://circleid.com/topicsthreat-intelligence"><strong>Threat Intelligence</strong></a>,&nbsp; <a href="https://circleid.com/topicsdomain-management"><strong>Domain Management</strong></a>,&nbsp; <a href="https://circleid.com/topicscybercrime"><strong>Cybercrime</strong></a>,&nbsp; <a href="https://circleid.com/topicsdns-security"><strong>DNS Security</strong></a>,&nbsp; <a href="https://circleid.com/topicsnetworks"><strong>Networks</strong></a>,&nbsp; <a href="https://circleid.com/topicsregistry_services"><strong>Registry Services</strong></a>,&nbsp; <a href="https://circleid.com/topicscyberattack"><strong>Cyberattack</strong></a>,&nbsp; <a href="https://circleid.com/topicsaccess_providers"><strong>Access Providers</strong></a>,&nbsp; <a href="https://circleid.com/topicsipv6-transition"><strong>IPv6 Transition</strong></a>,&nbsp; <a href="https://circleid.com/topicsipv4-markets"><strong> IPv4 Markets</strong></a>,&nbsp; <a href="https://circleid.com/topicsmalware"><strong>Malware</strong></a>,&nbsp; <a href="https://circleid.com/topicsweb"><strong>Web</strong></a>,&nbsp; <a href="https://circleid.com/topicsmobile_internet"><strong>Mobile Internet</strong></a>,&nbsp; <a href="https://circleid.com/topicsinternet_of_things"><strong>Internet of Things</strong></a>,&nbsp; <a href="https://circleid.com/topicsddos_attack"><strong>DDoS Attack</strong></a>,&nbsp; <a href="https://circleid.com/topicsbrand_protection"><strong>Brand Protection</strong></a>,&nbsp; <a href="https://circleid.com/topicscoronavirus"><strong>Coronavirus</strong></a>,&nbsp; <a href="https://circleid.com/topicswhois"><strong>Whois</strong></a>,&nbsp; <a href="https://circleid.com/topicspolicy_regulation"><strong>Policy & Regulation</strong></a>,&nbsp; <a href="https://circleid.com/topicsregional_registries"><strong>Regional Registries</strong></a>,&nbsp; <a href="https://circleid.com/topicsinternet_protocol"><strong>Internet Protocol</strong></a>,&nbsp; <a href="https://circleid.com/topicslaw"><strong>Law</strong></a>,&nbsp; <a href="https://circleid.com/topicsspam"><strong>Spam</strong></a>,&nbsp; <a href="https://circleid.com/topicstelecom"><strong>Telecom</strong></a>,&nbsp; <a href="https://circleid.com/topicscensorship"><strong>Censorship</strong></a>,&nbsp; <a href="https://circleid.com/topicsemail"><strong>Email</strong></a>,&nbsp; <a href="https://circleid.com/topicsudrp"><strong>UDRP</strong></a>,&nbsp; <a href="https://circleid.com/topicsnet_neutrality"><strong>Net Neutrality</strong></a> </div> <!-- RECENT COMMENTS --> <h2>Recent Comments</h2> <div class="postListMini" style="padding:0 0 15px 0;"> <div class="cmntList"> <strong><a href="https://circleid.com/posts/20141208_which_domains_stand_the_strongest_against_phishing_attacks/#10425">Which Domains Stand the Strongest Against Phishing Attacks?</a></strong> <div class="byLine">Dec 10, 2014 12:21 AM PST</div> </div> <div class="cmntList"> <strong><a href="https://circleid.com/posts/20141208_which_domains_stand_the_strongest_against_phishing_attacks/#10423">Which Domains Stand the Strongest Against Phishing Attacks?</a></strong> <div class="byLine">Dec 09, 2014 7:20 PM PST</div> </div> <div class="cmntList"> <strong><a href="https://circleid.com/posts/20141208_which_domains_stand_the_strongest_against_phishing_attacks/#10422">Which Domains Stand the Strongest Against Phishing Attacks?</a></strong> <div class="byLine">Dec 09, 2014 5:33 PM PST</div> </div> <div class="cmntList"> <strong><a href="https://circleid.com/posts/20141208_which_domains_stand_the_strongest_against_phishing_attacks/#10420">Which Domains Stand the Strongest Against Phishing Attacks?</a></strong> <div class="byLine">Dec 09, 2014 5:29 PM PST</div> </div> <div class="cmntList"> <strong><a href="https://circleid.com/posts/20141208_which_domains_stand_the_strongest_against_phishing_attacks/#10418">Which Domains Stand the Strongest Against Phishing Attacks?</a></strong> <div class="byLine">Dec 09, 2014 12:56 PM PST</div> </div> </div> <!-- RECENT BLOGS --> <!-- MOST POPULAR --> <h2>Popular Posts</h2> <div class="postListMini" style="padding:0 0 30px 0;"> <h3 style="padding-top:0;margin-top:0;border:none;"><a href="https://circleid.com/posts/domain_tasting_target_of_us_federal_cybersquatting_lawsuit">Domain Tasting Target of US Federal Cybersquatting Lawsuit</a></h3> <div class="byLine pipedLinks"> <ul> <li>Jun 03, 2006</li> <li>Comments: 77</li> <li>Views: 117,987</li> </ul> </div> <h3><a href="https://circleid.com/posts/the_problem_with_wikis">The Problem With Wikis</a></h3> <div class="byLine pipedLinks"> <ul> <li>Dec 06, 2005</li> <li>Comments: 12</li> <li>Views: 42,612</li> </ul> </div> <h3><a href="https://circleid.com/posts/how_indias_in_domain_rouses_from_its_slumber">How India&#8217;s .IN Domain Rouses from its Slumber</a></h3> <div class="byLine pipedLinks"> <ul> <li>Mar 31, 2005</li> <li>Comments: 19</li> <li>Views: 42,437</li> </ul> </div> <h3><a href="https://circleid.com/posts/20140207_more_problems_crop_up_universal_acceptance_of_top_level_domains">More Problems Crop Up With Universal Acceptance of Top Level Domains</a></h3> <div class="byLine pipedLinks"> <ul> <li>Feb 07, 2014</li> <li>Comments: 3</li> <li>Views: 37,239</li> </ul> </div> <h3><a href="https://circleid.com/posts/20110321_dnssec_deployment_reaching_critical_mass">DNSSEC Deployment Reaching Critical Mass</a></h3> <div class="byLine pipedLinks"> <ul> <li>Mar 21, 2011</li> <li>Comments: 7</li> <li>Views: 32,740</li> </ul> </div> </div> </div> </div> <div class="clear"></div> </div> <div id="footer"> <div id="footerContent"> <div style="float:left;"> <a href="/"><img src="/images/circleid.svg" border="0" style="width:140px;opacity: 0.9;" /></a><br /> <p style="font-size:14px;padding:11px 0 15px 0;margin:0;">A World-Renowned Source for Internet Developments. Serving Since 2002.</p> </div> <div style="float:right;"> <p style="font-size:12px;padding:0 0 10px 0;margin:0;line-height:1em;text-align:right;letter-spacing:0.05em;">FOLLOW</p> <a href="https://x.com/circleid" class="socialIcon"><i class="fa-brands fa-square-x-twitter"></i></a> <a href="https://www.facebook.com/circleid/" class="socialIcon"><i class="fa-brands fa-square-facebook"></i></a> <a href="https://www.linkedin.com/company/circleid" class="socialIcon"><i class="fa-brands fa-linkedin"></i></a> <a href="http://feeds.circleid.com/cid_master/" class="socialIcon"><i class="fas fa-rss-square"></i></a> </div> <div id="links" class="clear"> CIRCLEID: &nbsp; <a href="https://circleid.com/about">About</a> &nbsp;|&nbsp; <a href="https://circleid.com/about/contact">Contact Us</a> <br /> SECTIONS: &nbsp; <a href="/">Home</a> &nbsp;|&nbsp; <a href="https://circleid.com/topics">Topics</a> &nbsp;|&nbsp; <a href="https://circleid.com/blogs">Featured Blogs</a> &nbsp;|&nbsp; <a href="https://circleid.com/news">News Briefs</a> &nbsp;|&nbsp; <a href="https://circleid.com/industry">Industry Updates</a> &nbsp;|&nbsp; <a href="https://circleid.com/community">Community</a> <br /> TERMS OF USE: &nbsp; <a href="https://circleid.com/about/codes">Codes of Conduct</a> &nbsp;|&nbsp; <a href="https://circleid.com/about/privacy">Privacy Policy</a> &nbsp;|&nbsp; <a href="https://circleid.com/about/terms">Terms of Use</a> <br /><br /> Copyright &copy; 2002-2025 CircleID. All rights reserved unless where otherwise noted. <br />Local Time: Wednesday, April 23, 2025 12:54 PM PDT &ndash; Page Load: 0.2596 Sec. </div> </div> </div> <script>(function(){function c(){var b=a.contentDocument||a.contentWindow.document;if(b){var d=b.createElement('script');d.innerHTML="window.__CF$cv$params={r:'934fea3abea35888',t:'MTc0NTQzODA5MC4wMDAwMDA='};var a=document.createElement('script');a.nonce='';a.src='/cdn-cgi/challenge-platform/scripts/jsd/main.js';document.getElementsByTagName('head')[0].appendChild(a);";b.getElementsByTagName('head')[0].appendChild(d)}}if(document.body){var a=document.createElement('iframe');a.height=1;a.width=1;a.style.position='absolute';a.style.top=0;a.style.left=0;a.style.border='none';a.style.visibility='hidden';document.body.appendChild(a);if('loading'!==document.readyState)c();else if(window.addEventListener)document.addEventListener('DOMContentLoaded',c);else{var e=document.onreadystatechange||function(){};document.onreadystatechange=function(b){e(b);'loading'!==document.readyState&&(document.onreadystatechange=e,c())}}}})();</script></body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10