Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

8/5/2016
08:30 PM
Connect Directly
Facebook
Twitter
RSS
E-Mail
50%
50%

New Internet Security Domains Debut

Meet the new .security and .protection domains.

Registry operator gen.xyz these week launched two new top-level Internet domains -- .security and .protection -- aimed at creating websites with higher security as well as a safer online experience for end users.

Registrants can use domains to reinforce a brand, organization name, service locations, or industry keywords, says Nils Decker, director of business development for gen.xyz.  

Big security players such as Norton, FireEye, and Masterlock, have already registered names with the new .security and .protection domains.  An organization in Southern California, for example, might select la.security; spam.protection could do the trick for an email filtering company. 

Early adopters of the new domains include Microsoft's office365.protection site; IBM managed security provider blue.security; arrow.security (formerly arrowsecuritycorp.com); and grupo.security (formerly security.cl).

Registrants are strongly encouraged – but not required by gen.xyz -- to use both SSL and DNSSEC to bolster security. The protocols ensure that "a website visitor that the company behind the website is a legitimate company, and that they're actually talking to who they think you're talking to, not a phisher or malicious site," Decker says.

Pricing for the new domains is relatively expensive, between $2,500 and $4,000. Decker and gen.xyz are counting on that high price point to discourage spammers and miscreants from using the domains as covers for malicious activity or spoofing.

"If the technology creates more security awareness or makes customers more comfortable, they're more likely to succeed," says domain name expert Monte Cahn, president of Rightofthedot, which advises on top-level domain strategies. Cahn notes that he hasn't seen the details of gen.xyz's announcement, but did note that other more recently introduced domains such as .bank and .insurance, have been well-received. However, those domains also come with special registration forms to verify that would-be registrants are in fact part of the industries they say they are, Cahn notes.

Decker says gen.xyz isn't doing any verification itself, but rather leaving that up to SSL providers such as Symantec or Comodo. "At a high level, we are the registry operator, so we control the name space, but don't sell the names themselves," Decker says. "End-user companies go to GoDaddy or Web.com for that."

Because the domains are so new and considered premium domains, availability is quite good, Decker says, in contrast to .com or .org, which are much more picked over.

 

Terry Sweeney is a Los Angeles-based writer and editor who has covered technology, networking, and security for more than 20 years. He was part of the team that started Dark Reading and has been a contributor to The Washington Post, Crain's New York Business, Red Herring, ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
clipartsgram
50%
50%
clipartsgram,
User Rank: Apprentice
10/31/2016 | 10:09:38 PM
Re: Clipart
yeah! I agree with you.This post very benefit for everyone.
T Sweeney
50%
50%
T Sweeney,
User Rank: Moderator
10/17/2016 | 12:08:21 PM
Re: Identity theft
It's a good reminder that these new domains, in and of themselves, are not inherently secure, lorraine89. Humans still need to add basic protections and anonymizing features, like the ones you've suggested.
lorraine89
50%
50%
lorraine89,
User Rank: Ninja
10/17/2016 | 11:54:09 AM
Identity theft
New domains are pretty much vulnerable to data theft. That is why it is important to deploy some good security software and hide your IP using a genuine vpn server like PureVPN. 
lorraine89
50%
50%
lorraine89,
User Rank: Ninja
9/19/2016 | 9:38:58 AM
online security
Great article. I always take extra caution in maintaining my online privacy and security. I deploy vpn server, purevpn, to maintain my online integrity and to avoid any type of scams and phishy threats. 
Shantaram
50%
50%
Shantaram,
User Rank: Ninja
9/15/2016 | 5:00:16 AM
192.168.l.l
This article gives the light in which we can observe the reality. This is very nice one and gives in-depth information. Thanks for this nice article
showtime33
50%
50%
showtime33,
User Rank: Apprentice
8/22/2016 | 9:31:04 AM
Re: The Irony of It
Finally....some smarts about TLD's.  Exactly right, a new domain name is just another thing to block.  Making it harder to defend by adding extensions to block.  Ask people that fix pc's in the trenches and you will find that .biz, .casino,..etc... is just another way to launch a malware link to compromise a pc.  Malware can still use .security to launch randsomware for example.  duh...adding them does nothing for protection for anyone. The irony is right....lol
umutarcn
50%
50%
umutarcn,
User Rank: Apprentice
8/9/2016 | 11:31:05 PM
Quotes
Thanks, for the information on SSL and domain details.
SEO..
50%
50%
SEO..,
User Rank: Apprentice
8/9/2016 | 11:40:49 AM
Does it really matter to have .com
Thanks, for the information on SSL. On other hand, recently I read an atricle which said it's no more important to have domain as .com it can be anything google no more consider much weightage on this domain scenario. I am planning to buy one as a web designer - let me know your thought's  
JulietteRizkallah
50%
50%
JulietteRizkallah,
User Rank: Ninja
8/9/2016 | 10:16:52 AM
Re: Worth a try
Yes agreed as well, one protection or measure is never enough.  I am looking at it more as an additional potential measure.
T Sweeney
50%
50%
T Sweeney,
User Rank: Moderator
8/9/2016 | 10:11:41 AM
Re: Worth a try
Agreed, Juliette... but a simple domain in and of itself will not convey security on a website or its visitors. Regardless of what your domain is, there's plenty that still needs to happen on the backend to lock down and protect hardware, data and users.
Page 1 / 2   >   >>
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Ransomware Damage Hit $11.5B in 2019
Dark Reading Staff 2/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-0828
PUBLISHED: 2020-02-21
Heap-based buffer overflow in Xchat-WDK before 1499-4 (2012-01-18) xchat 2.8.6 on Maemo architecture could allow remote attackers to cause a denial of service (xchat client crash) or execute arbitrary code via a UTF-8 line from server containing characters outside of the Basic Multilingual Plane (BM...
CVE-2012-0844
PUBLISHED: 2020-02-21
Information-disclosure vulnerability in Netsurf through 2.8 due to a world-readable cookie jar.
CVE-2013-3587
PUBLISHED: 2020-02-21
The HTTPS protocol, as used in unspecified web applications, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which makes it easier for man-in-the-middle attackers to obtain plaintext secret values by observing length differences during a series of guesses...
CVE-2012-6277
PUBLISHED: 2020-02-21
Multiple unspecified vulnerabilities in Autonomy KeyView IDOL before 10.16, as used in Symantec Mail Security for Microsoft Exchange before 6.5.8, Symantec Mail Security for Domino before 8.1.1, Symantec Messaging Gateway before 10.0.1, Symantec Data Loss Prevention (DLP) before 11.6.1, IBM Notes 8....
CVE-2012-0063
PUBLISHED: 2020-02-21
Insecure plugin update mechanism in tucan through 0.3.10 could allow remote attackers to perform man-in-the-middle attacks and execute arbitrary code ith the permissions of the user running tucan.