Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Security Architecture

VeriSign Gets Control of .Net Registry for Next Six Years

VeriSign today announced that the Internet Corporation for Assigned Names and Numbers (ICANN) renewed the company’s contract to serve as the authoritative registry operator for the .net registry for another six years.

More than half of the world’s domains rely on Verisign’s infrastructure, and the company has held management of the .com/.net infrastructure for over 12 years. VeriSign also manages two of the world’s 13 Internet root servers, a.root-servers.net and j.root-servers.net, considered national IT assets by the U.S. Federal government.

VeriSign today announced that the Internet Corporation for Assigned Names and Numbers (ICANN) renewed the company’s contract to serve as the authoritative registry operator for the .net registry for another six years.

More than half of the world’s domains rely on Verisign’s infrastructure, and the company has held management of the .com/.net infrastructure for over 12 years. VeriSign also manages two of the world’s 13 Internet root servers, a.root-servers.net and j.root-servers.net, considered national IT assets by the U.S. Federal government.

“As the demands on the Domain Name System grow to unprecedented levels, Verisign will continue to build and invest in the infrastructure that supports .net to ensure its continued secure and stable operation,” said Mark McLaughlin, Verisign’s president and CEO. “Verisign is proud to have been entrusted with this responsibility.”

In May 2010, VeriSign sold its identity and authentication business (Secure Sockets Layer (SSL) Certificate Services, Public Key Infrastructure (PKI) Services, VeriSign Trust Services and VeriSign Identity Protection (VIP) Authentication Service) to Symantec for $1.28 Billion in cash.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Artificial Intelligence

ChatGPT is increasingly integrated into cybersecurity products and services as the industry is testing its capabilities and limitations.

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Artificial Intelligence

Microsoft and Mitre release Arsenal plugin to help cybersecurity professionals emulate attacks on machine learning (ML) systems.

Management & Strategy

Hundreds of companies are showcasing their products and services this week at the 2023 edition of the RSA Conference in San Francisco.

Endpoint Security

Apple has launched a new security research blog and website, which will also be the new home of the company’s bug bounty program.