Home
About
Policy
Security & Tech
Data Analysis
Dashboards
Quarterly Report Archives
DNIB Staff
Policy
Domain Name Contact Data Availability Study
1 min. read
|
Nov 21, 2024
Policy
Report Examines Domain Name Contact Data Availability and Privacy
7 min. read
|
Nov 21, 2024
Report
The DNIB Quarterly Report Q3 2024
Data and Analysis
6 min. read
|
Oct 25, 2024
Report
The DNIB Quarterly Report Q2 2024
Data and Analysis
6 min. read
|
Jul 25, 2024
Report
The DNIB Quarterly Report Q1 2024
Data and Analysis
7 min. read
|
Jul 10, 2024
Report
The Domain Name Industry Brief Quarterly Report
Volume 21, Issue 1
Q4 2023 Data and Analysis
6 min. read
|
Feb 14, 2024
Report
The Domain Name Industry Brief Quarterly Report
Volume 20, Issue 4
Q3 2023 Data and Analysis
6 min. read
|
Nov 15, 2023
Report
The Domain Name Industry Brief Quarterly Report
Volume 20, Issue 3
Q2 2023 Data and Analysis
6 min. read
|
Sep 7, 2023
Data Analysis
Expanding the Number of TLDs Included in Dashboards and Quarterly Reports
The Q2 2023 DNIB Quarterly Report incorporates 16 additional TLDs.
3 min. read
|
Sep 7, 2023
Security & Tech
The Journey to Required 2-Factor Authentication at Verisign
Becoming a ubiquitous security requirement took more than a decade, but two-factor authentication is far from new.
9 min. read
|
Jun 22, 2023
Report
The Domain Name Industry Brief
Volume 20, Issue 2
Q1 2023 Data and Analysis
7 min. read
|
Jun 8, 2023
Report
The Domain Name Industry Brief
Volume 20, Issue 1
Q4 2022 Data and Analysis
6 min. read
|
Mar 1, 2023
Report
The Domain Name Industry Brief
Volume 19, Issue 4
Q3 2022 Data and Analysis
6 min. read
|
Dec 8, 2022
Report
The Domain Name Industry Brief
Volume 19, Issue 3
Q2 2022 Data and Analysis
6 min. read
|
Sep 1, 2022
Report
The Domain Name Industry Brief
Volume 19, Issue 2
Q1 2022 Data and Analysis
7 min. read
|
Jun 1, 2022
Security & Tech
Using DANE for Authentication of Internet Services
7 min. read
|
Sep 1, 2015
Policy
Cryptocurrency and the DNS
Even a decentralized ecosystem needs a trusted, neutral way to connect back to the rest of the world.
8 min. read
|
Jan 2, 2015
Security & Tech
The Domain Threat Landscape
Protecting critical infrastructure requires a layered security approach.
6 min. read
|
Aug 1, 2014