George Kurtz, co-founder and CEO of CrowdStrike, discusses the cybersecurity company's IPO on the Nasdaq with CNBC's "Squawk Alley" team, June 12, 2019.
CrowdStrike, Inc. is a U.S.-based cybersecurity technology company, with headquarters in Sunnyvale, California, and a wholly owned subsidiary of CrowdStrike Holdings, Inc. The company provides endpoint security, threat intelligence, and incident response services to customers in more than 170 countries. Leveraging artificial intelligence (AI), the CrowdStrike Falcon® platform protects customers against cyberattacks on endpoints on or off the network by offering visibility and protection across the enterprise.
Founders: George Kurtz, Dmitri Alperovitch, Gregg Marston
CrowdStrike Holdings, Inc. (NASDAQ: CRWD), announced June 11, 2019, the pricing of its initial public offering of 18,000,000 shares of its Class A common stock at a price to the public of $34.00 per share. CrowdStrike granted the underwriters a 30-day option to purchase up to 2,700,000 additional shares of Class A common stock at the initial public offering price less underwriting discounts and commissions. The shares began trading on the Nasdaq Global Select Market, June 12, 2019, under the symbol "CRWD." The offering is expected to close on June 14, 2019, subject to customary closing conditions.
"The High-level Panel on Digital Cooperation was established by United Nations Secretary-General António Guterres to advance a dialogue on strengthening international cooperation in the digital age."
The High-level Panel on Digital Cooperation will launch its final report on Monday 10 June 2019. To mark the occasion, join a live conversation on digital cooperation with:
"This global online event is an opportunity to discuss how the public sector, private sector and civil society can work together to realize the potential of digital technologies for advancing human well-being, while mitigating the risks. Communities, organizations and individuals working on issues ranging from digital inclusion, digital rights & security, governance and more are encouraged to tune in and join the online conversation during the broadcast."
It’s been one year since the EU’s landmark privacy rules called GDPR went into effect. Now other countries, including the U.S., are looking to adopt their own versions of the law. CNBC.com’s Elizabeth Schulze reports. CNBC International video published May 22, 2019.
See also:
How Silicon Valley gamed Europe’s privacy rules--"The region’s data protection overhaul was supposed to help citizens. Instead, it’s helped Big Tech."--politico.eu; Editor's note: some are now saying GDPR has actually helped big tech companies enlarge their dominance in the digital data economy while smaller companies have suffered from GDPR complexity and its relatively high compliance costs.
Ireland's Data Protection Commission, the lead EU data protection authority (DPA) for Google, has announced an investigation into Google's online advertising data collection.
Julian Assange arrested: What now for the Wikileaks founder?
Wikileaks founder, Julian Assange, is in custody in the United Kingdom (UK) after being arrested for allegedly breaching his bail conditions. His seven-year self-imposed exile in London's Ecuadorean embassy ended dramatically April 11, 2019, after his asylum was revoked. Mr Assange also faces extradition to the United States (see below). His supporters are calling it a 'dark day for journalism.' Channel 4 News (UK) video above published Apr 11, 2019.
Department of Justice
U.S. Attorney’s Office
Eastern District of Virginia
FOR IMMEDIATE RELEASE
Thursday, April 11, 2019
WikiLeaks Founder Charged in Computer Hacking Conspiracy
ALEXANDRIA, Va. – Julian P. Assange, 47, the founder of WikiLeaks, was arrested today in the United Kingdom pursuant to the U.S./UK Extradition Treaty, in connection with a federal charge of conspiracy to commit computer intrusion for agreeing to break a password to a classified U.S. government computer.
According to court documents unsealed today, the charge relates to Assange’s alleged role in one of the largest compromises of classified information in the history of the United States.
The indictment alleges that in March 2010, Assange engaged in aconspiracy with Chelsea Manning, a former intelligence analyst in the U.S. Army, to assist Manning in cracking a password stored on U.S. Department of Defense computers connected to the Secret Internet Protocol Network (SIPRNet), a U.S. government network used for classified documents and communications. Manning, who had access to the computers in connection with her duties as an intelligence analyst, was using the computers to download classified records to transmit to WikiLeaks. Cracking the password would have allowed Manning to log on to the computers under a username that did not belong to her. Such a deceptive measure would have made it more difficult for investigators to determine the source of the illegal disclosures.
During the conspiracy, Manning and Assange engaged in real-time discussions regarding Manning’s transmission of classified records to Assange. The discussions also reflect Assange actively encouraging Manning to provide more information. During an exchange, Manning told Assange that “after this upload, that’s all I really have got left.” To which Assange replied, “curious eyes never run dry in my experience.”
Assange is charged with conspiracy to commit computer intrusion and is presumed innocent unless and until proven guilty beyond a reasonable doubt. If convicted, he faces a maximum penalty of five years in prison. Actual sentences for federal crimes are typically less than the maximum penalties. A federal district court judge will determine any sentence after taking into account the U.S. Sentencing Guidelines and other statutory factors.
G. Zachary Terwilliger, U.S. Attorney for the Eastern District of Virginia, John C. Demers, Assistant Attorney General for National Security, and Nancy McNamara, Assistant Director in Charge of the FBI’s Washington Field Office, made the announcement after the charges were unsealed. First Assistant U.S. Attorney Tracy Doherty-McCormick, Assistant U.S. Attorneys Kellen S. Dwyer, Thomas W. Traxler and Gordon D. Kromberg, and Trial Attorneys Matthew R. Walczewski and Nicholas O. Hunter of the Justice Department’s National Security Division are prosecuting the case.
The extradition will be handled by the Department of Justice’s Office of International Affairs.
A copy of this press release is located on the website of the U.S. Attorney’s Office for the Eastern District of Virginia. Related court documents and information are located on the website of the District Court for the Eastern District of Virginia or on PACER by searching for Case No. 1:18-cr-111.
An indictment contains allegations that a defendant has committed a crime. Every defendant is presumed to be innocent until and unless proven guilty in court. [emphasis added]
This shocking video from Iraq, revealed by WikiLeaks, showing the killing of civilians and Reuters journalists provides some context to today’s moves towards extraditing Julian Assange to the USA. pic.twitter.com/GQwg0Spbz6
The extradition of Julian Assange to the US for exposing evidence of atrocities in Iraq and Afghanistan should be opposed by the British government.--Jeremy Corbyn MP, Leader of the Labour Party
** STATEMENT: Chelsea's legal team responds to today's unsealed indictment. This is further evidence that the government's continued imprisonment of Chelsea for her principled stance against grand jury secrecy is punitive, cruel and unnecessary https://t.co/WZiDuVWHPa
For people who have spent 3 years claiming that (1) WikiLeaks is an arm of Russian intelligence and (2) Putin controls Trump, how do you reconcile those conspiracy beliefs with the fact that it was the Trump administration that devoted itself with such vigor to indicting Assange? pic.twitter.com/IcDiXOCHhZ
The continued imprisonment of @xychelsea is an utter disgrace. The arrest of Julian Assange represents an extremely dangerous crossing of the rubicon. This is an assault on journalism and a free press. All journalists should stand in fierce opposition.
Arrest of Wikileaks' Assange in UK takes him a step closer to poss extradition to US, and potential "serious human rights violations", warn @UNHumanRights experts.https://t.co/g5rzBX8YnZ
LIVE Online via the Next OnAir livestream. Watch more than 75 live sessions, behind-the-scenes interviews, and more.
Google Cloud Next '19: Day 1 Secure Channel
Google Cloud video above scheduled for Apr 9, 2019: "Innovate without sacrificing security. Our Secure channel includes sessions on how to secure applications and resources, plus develop comprehensive security and compliance strategies for your organization. Live sessions run all day starting at 11:10 AM PST, April 9, 2019."
Google Cloud Next '19: Day 1 Next Live Show
Google Cloud video above scheduled for Apr 9, 2019: "Join us at Next, wherever you are. With the Next Live Show channel, you’ll get a guided tour of the Next ’19 experience. Enjoy product demos, session recaps, plus 1:1 interviews with Google Cloud customers, partners, and industry experts." 2nd and 3rd day via YouTube: Google Cloud YouTube Channel.
Inmarsat Fleet Secure Endpoint for cyber resilience at sea
The maritime industry is at increasing risk of cyber security breaches every day but conventional antivirus cover is no longer enough to protect vessels again new forms of malware which use the network to attack your systems. Inmarsat’s Fleet Secure Endpoint has an advanced ransomware detection engine to continually inspect, detect, alert and respond to threats and is remotely monitored 24/7/365. Video above published Jan, 2019.
UK’s Inmarsat Satellite Group Going Private in $3.4 Billion Deal--bloomberg.com: Inmarsat has been in play since last year as it faces growing competition from traditional rivals such as ViaSat Inc. and new challengers including Richard Branson-backed OneWeb and Elon Musk’s SpaceXoffering smaller, cheaper satellites.
Inmarsat received an all-cash offer from a private equity consortium for a total consideration of $3.4B. The deal is not expected to close before Q4 2019--until then, any other party can submit an offer. Strong Q4 2018 results for maritime and aviation broadband indicates bright prospects.--SeekingAlpha.com: Inmarsat: Latest Offer Undervalues The Company.
Inmarsat plc is a UK satellite telecommunications company. It offers global mobile services, telephone and data services, to users worldwide, via portable or mobile terminals which communicate with ground stations through thirteen geostationary telecommunications satellites. Inmarsat has been working on selling faster, more reliable internet services to the world’s airlines.
A report, contracted by the USCC [U.S.-CHINA Economic And Security Review Commission] and authored by SOS International, outlines China’s state-led approach to IoT development, assesses the implications for the U.S. economy, national security, and the privacy of U.S. data, and makes recommendations for U.S. policymakers. China’s concerted, state-led approach, including ongoing efforts to influence international IoT standards, has put China in a position to credibly compete against the United States and other leaders in the emerging IoT industry. China’s research into IoT security vulnerabilities and its growing civil-military cooperation raise concerns about gaining unauthorized access to IoT devices and sensitive data. In addition, China’s authorized access to the IoT data of U.S. consumers will only grow as Chinese IoT companies leverage their advantages in production and cost to gain market share in the United States based on the terms of use and sweeping Chinese government data access powers.
The Chinese government is driving development of the IoT—an industry it views as strategic—
through the creation of IoT industrial and innovation centers, extensive financial support, and
favorable regulations. Foreign firms, which are considered strategic rivals, face an uneven
playing field and are subject to a number of policies that disadvantage them in favor of domestic
firms, including restrictions on foreign investment, selective enforcement of Chinese laws to
hinder the operation of foreign IoT firms in China, and forced technology transfer.
China’s large market size, production capacity, and government support offer it some significant
advantages, but it is still behind U.S. and other foreign leaders in many IoT technologies.
Therefore, there is still a window for U.S. companies and the U.S. government to maintain a
technological edge and influence future IoT development, standards, and roll-out.
The Chinese government is actively attempting to influence international technical standards for
the IoT that would benefit Chinese companies at the expense of U.S. and other foreign
counterparts. China pursues a more coordinated and comprehensive strategy than the United
States’ private-sector-led approach with U.S. entities often absent from key international
standardization processes.
China has laid a solid groundwork for a comprehensive roll-out of fifth-generation wireless
technology (5G), which will make the IoT faster and more effective, relying on a whole-ofcountry
approach that has created an entire ecosystem for domestically manufactured 5G
technologies and furthered their inclusion in international technical standards. China is on track to
roll-out the largest and most reliable 5G networks, gaining a head start in developing the
technologies that 5G enables—first among them, the IoT.
Chinese-manufactured IoT devices have already become common vehicles for unauthorized
access due to their widespread usage and insecure device configurations that have resulted in
surreptitious data collection and the exploitation for cyberattacks, unauthorized remote access,
and data theft.
China is actively researching IoT vulnerabilities, both for security purposes and almost certainly
to collect intelligence, conduct network reconnaissance for cyberattacks, and enhance its domestic surveillance powers. The combination of widespread adoption of IoT products and Chinese research into IoT exploits raises the threat of unauthorized access to U.S.-based IoT devices and networks.
China’s authorized access to the IoT data of U.S. consumers will only grow as Chinese IoT companies leverage their advantages in production and cost to gain market share in the United States.
While authorized data access, collection, and processing are indispensable parts of the IoT’s transformative potential, China poses a grave threat to U.S. privacy as its government and surveillance apparatuses are empowered to access this data well in excess of accepted international norms. In the short term, Chinese government and corporate access to U.S. data would be a huge opportunity for Chinese intelligence targeting operations. In the longer term, such access would provide a major edge to Chinese artificial intelligence (AI) development efforts, eventually culminating in a substantial Chinese economic advantage in another field that is expected to shape the economy of the future. Existing U.S. data protections appear insufficient to protect U.S. data against harmful but authorized data access. The patchwork nature of U.S. laws and authorities leaves loopholes that could facilitate Chinese access to U.S. IoT data in bulk, an especially risky proposition given known Chinese motivations for accessing big data.
UPDATE: VeriSign, Inc. (NASDAQ: VRSN) (domain: Verisign.com), registry operator of top-level domains (TLDs), including gTLDs .COM and .NET, and an internet security services provider, released earnings for the third quarter, Q3 2018, at approximately 4:05 p.m. EDT Thursday, Oct 25, 2018.
UPDATE: Earnings Results (pdf) excerpts--GAAP EPS of $1.13, revenue of $305.78M (+4.6% Y/Y):
Third Quarter GAAP Financial Results VeriSign, Inc. and subsidiaries (“Verisign”) reported revenue of $306 million for the third quarter of 2018, up 4.6 percent from the same quarter in 2017. Verisign reported net income of $138 million and diluted earnings per share (diluted “EPS”) of $1.13 for the third quarter of 2018, compared to net income of $115 million and diluted EPS of $0.93 for the same quarter in 2017. The operating margin was 63.8 percent for the third quarter of 2018 compared to 61.9 percent for the same quarter in 2017.
On Oct. 24, 2018, Verisign entered into an agreement with NeuStar, Inc. (“Neustar”) to sell the rights, economic benefits, and obligations, in all customer contracts related to its Security Services business. The transaction includes the sale of customer agreements related to Verisign’s Distributed Denial of Service Protection, Managed Domain Name System (“DNS”), DNS Firewall, and Recursive DNS services. Verisign will retain its proprietary technology, network assets, critical infrastructure, software, and public DNS service to focus solely on supporting Verisign’s core mission: ensuring the security, stability, and resiliency of our core infrastructure. As part of the transaction, Verisign will continue to support the Security Services customers during the transition to Neustar, pursuant to a transition services agreement that is expected to be executed at closing. The transaction is subject to customary regulatory approval and is expected to close shortly following the receipt of such approval. The purchase price, subject to a cap of $120 million, consists of a payment of $50 million, due at the time of closing, plus an additional contingent amount, due after the first anniversary of closing. The additional contingent amount, which cannot be negative, is based upon, among other things, the successful transition of customers to Neustar during the 12-month period following closing. In commenting on the transaction, Jim Bidzos added: “Verisign is committed to focusing on its core mission of providing critical internet infrastructure, including Root Zone management, operation of 2 of the 13 global internet root servers, operation of .gov and .edu, and authoritative resolution for the .com and .net top-level domains, which support the majority of global ecommerce. For this reason, Verisign is transitioning its Security Services customers to Neustar.” (emphasis added)
Verisign is in negotiations to extend the Cooperative Agreement with NTIA and believes these negotiations will result in an extension agreement before Nov 30, 2018. Details to be finalized and Verisign could not disclose anything further.
Nothing to report re: new gTLD .WEB ("on hold" at ICANN).
Excerpts from the slides below. See also SEC 10-Q.
On Thursday, Oct 25, 2018, at 4:30 p.m. EDT, Verisign's management held the Q3 2018 earnings conference call that was webcast LIVE at investor.verisign.com. Replay available at the same website.
The conference call was also accessible by direct dial at (888) 676-VRSN (U.S.) or (786) 789-4776 (international), conference ID: Verisign. An audio archive of the call will be available at https://investor.verisign.com/events.cfm. Tweets by VERISIGN
Joe Kava, Vice President of Google Data Center Operations, gives a tour inside a Google data center in South Carolina (US), and shares details about the security, sustainability and the core architecture of Google's infrastructure in this video first published Dec 16, 2014.
AWS Security by Design
Amazon Web Services (AWS) video above first published May 23, 2018: AWS London Summit 2018 Breakout Session: A Deep Dive into the best practice guidelines for securing your workloads. Learn more about AWS at aws.amazon.com.
Introduction to Sqrrl – "Who We Are in a Nutshell"
Sqrrl video above published Jan 5, 2017: "Want to find out more about Sqrrl? Watch this 2-minute overview video and in just seconds you'll hear our company mission and how our Threat Hunting Platform can help your organization discover hidden threats that already exist inside your network. "Sqrrl’s Threat Hunting Platform combines intuitive hunt capabilities with powerful machine learning analytics that detect subtle and linked anomalies associated with kill chain tactics. By transforming raw data into contextual knowledge and actionable insights, Sqrrl displays every asset or entity data (including users, hosts, IPs, domains, etc.) as connected nodes on a graph. Sqrrl simplifies hunting for users with any skill level, as hunters can seamlessly pivot through network, identity, endpoint, and security data based on pre¬defined connections between the various entities." Amazon.com, Inc. (NASDAQ: AMZN) is in advanced talks to acquire Sqrrl, a startup that analyzes big data to detect cybersecurity threats, according to a report in Axios.com.
Sqrrl Data, Inc. (domain: sqrrl.com): a U.S.-based company founded in 2012 that markets software for big data analytics and cyber security; the company has roots in the United States intelligence community and National Security Agency according to Wikipedia.org.
Headquarters: Cambridge, MA
Founded: 2012
Type of business: Private -- startup Sqrrl has raised almost $30 million from venture capital firms including Accomplice, Matrix Partners, Rally Ventures and Spring Lake Equity Partners.
Privacy: Unlike many other DNS services, Quad9 makes use of aggregated data, but by design does not store, correlate or otherwise employ any personally identifiable information (PII). Quad9 does not and never will share any of its data with marketers, nor will it use this data for demographic analysis.
Security: Quad9 makes security a chief priority to deliver superior protection against cybercrime networks and malware, integrating security analysis from individual machines’ DNS queries to global trends.
Scalability: Quad9 leverages PCH’s long history of providing highly robust DNS back-end infrastructure, including over 160 points of presence around the world.
Ease of use: Administrators can easily configure endpoint devices to point to the Quad9 DNS server at address 9.9.9.9.
Safer Internet Experience for South Africa Announced | allAfrica.com: "... a free new global Domain Name System (DNS) service ... Quad9 provides an immunisation service against malware. It supports end-to-end encryption. The system has been in pilot for a year, with almost 1 million users globally ..."
#Quad9 is a system that blocks domains associated with botnets, phishing attacks, and other malicious Internet hosts—primarily targeted at organizations that don't run their own DNS blacklisting and whitelisting services. https://t.co/iQNFJ80I8I
#SubDCCP Examines Data Security Practices For Consumers’ Credit Information - Energy and Commerce Committee: The Subcommittee on Digital Commerce and Consumer Protection, chaired by Rep. Bob Latta (R-OH), announced a hearing for Wednesday, November 1, 2017, at 10:00 a.m. in room 2123 of the Rayburn House Office Building. The hearing is entitled, “Securing Consumers’ Credit Data in the Age of Digital Commerce.” Less than a month after holding a hearing on the Equifax data breach, #SubDCCP will examine data security practices within the credit reporting industry to shed light on best practices, cybersecurity information sharing, trends, and steps for improvement. “The Equifax data breach was a stark demonstration of the responsibility that credit bureaus have in holding hundreds of millions of Americans’ personal information. In light of this breach and others, consumers are right to be skeptical. This subcommittee will continue to ask questions on behalf of consumers to illuminate what is currently being done, and what needs to be done, to prevent and mitigate future hacks and restore consumer confidence,” said Latta.
Note also: House Energy and Commerce Committee Chairman Greg Walden (R-OR) published op-ed Oct 27, "Consumer Protection in the 21st Century," announcing a series of hearings surrounding tech business practices and their impact on consumers. In the piece, Walden raises questions about how actions taken by tech companies and online businesses affect consumer privacy and choice.
Hackers will pose a greater cybersecurity threat in 2018
As more elements of our daily lives are linked to the internet, hackers will have greater opportunity to scale up cybercrimes, leaving our homes and personal lives more vulnerable to attack, reports The Economist (economist.com), which published the above video on Oct 4, 2017:
"In 2018 cyber attacks will affect our lives like never before. Hackers have already compromised multi-national organisations, stealing the personal details of millions. Hackers have even been implicated in national elections.
"On the golden shores of Hawaii lives one of the most prolific hackers on the planet. At the age of 22, Jeremiah Grossman hacked Yahoo – one of the biggest tech companies in the world. In response, they offered him a job – Yahoo’s Chief Hacker.
"According to Jeremiah "There’s a vernacular in the industry, there is the white hat hackers and then there is the black hat hackers. The way I like to describe it is kind of like Star Wars where you have the Jedi and the Sith. The skills are the same but one uses their powers for good and the other one is for evil. I am more of the white hat variety. I use those skills to prevent other people from getting hacked. There is people all over the world attacking you and you have to remain calm and steadfast at every point because if you lose control you will lose the battle."
"White hat hackers break into computer systems to find the weaknesses and make companies aware of them. But it’s about to get even harder to keep up the defences.
"With an ever-increasing risk to corporate security, 2018 will see an unlikely saviour in the fight against hackers - Insurance companies.
"But cyber insurance can only go so far when we are all becoming vulnerable to attack. More and more of our every day lives are being hardwired to the internet from the lock on our front door to our heating. Being connected may bring convenience, but it also makes our homes and our personal lives more vulnerable to hackers."
Oversight of the Equifax Data Breach: Answers for Consumers
House Energy and Commerce Committee, Subcommittee on Digital Commerce and Consumer Protection, Hearing Oct 3, 2017, 10am EDT (video starts @22:22). @HouseCommerce#SubDCCP
DEF CON 25 - SupaFraud - Official DEF CON Teaser Video
25 Years! DEF CON is the world's longest running and largest hacker convention. It takes place immediately following Black Hat in Las Vegas every year.
Twitter Q2 2017 results: Q2 total revenue was $574M; GAAP net loss $116M with -20% margin; adj. EBITDA was $178M, with adj. EBITDA margin of 31%; DAU grew 12% Y/Y, marking the third consecutive quarter of double-digit growth.Specifically, in Q2, we achieved the following results:
• Q2 revenue totaled $574 million, a decrease of 5% year-over-year.
Advertising revenue totaled $489 million, a decrease of 8% year-over-year.
Data licensing and other revenue totaled $85 million, an increase of 26% year-over-year.
US revenue totaled $335 million, a decrease of 7% year-over-year.
International revenue totaled $239 million, a decrease of 1% year-over-year.
Total ad engagements increased 95% year-over-year.
Cost per engagement (CPE) decreased 53% year-over-year.
Tweet your question to @TwitterIR using #TWTR. Investor Relations: investor.twitterinc.com for more information. Twitter has used, and intends to continue to use, its Investor Relations website and the Twitter accounts of @jack, @twitter and @TwitterIR as means of disclosing material non-public information and for complying with its disclosure obligations under Regulation FD."--Twitter Inc.Tweets by TwitterIR
The earnings call will also be accessible via direct dial at (888) 676-VRSN (U.S.) or (913) 312-6675 (international), conference ID: Verisign. An audio archive of the call will be available at https://investor.verisign.com/events.cfm.
Verisign FORM 10-Q excerpt:"On January 18, 2017, the Company received a Civil Investigative Demand (“CID”) from the Antitrust Division of the United States Department of Justice (“DOJ”) requesting certain material related to the Company becoming the registry operator for the . web gTLD. We are cooperating with the DOJ. At this time, the Company is unable to estimate a range of potential financial and non-financial outcomes in connection with this matter. Verisign is also involved in various investigations, claims and lawsuits arising in the normal conduct of its business, none of which, in its opinion, will have a material adverse effect on its financial condition, results of operations, or cash flows. The Company cannot assure you that it will prevail in any litigation. Regardless of the outcome, any litigation may require the Company to incur significant litigation expense and may result in significant diversion of management attention."
The Q2 2017 earnings news release and slides embedded below, via the company's investor relations website:
Verisign provides top-level domain (TLD) registry operator services (including .COM and .NET), as well as providing internet security services, and serving as the internet's root zone maintainer and operator of two (a. and j.) of the world's 13 internet root servers for the internet's Domain Name System (DNS). Verisign's security services include Distributed Denial of Service (DDoS) Protection and Managed DNS.
New gTLD .WEB
Last year, Verisign revealed it had provided funding to Nu Dot Co LLC, winner of the ICANN "last resort auction" for new gTLD (new generic top-level domain) .WEB, and had an agreement for transfer of Nu Dot Co's rights re: .WEB to Verisign.
New gTLD .WEB Auction Results | ICANN.org: An auction took place on 27 July 2016 to remove string contention among the .WEB .WEBS applicants. Nu Dot Co LLC was designated the winner of .WEB at the close of the auction. "Contention set on hold pending accountability mechanism."
More information re: new gTLD .WEB on DomainMondo.com: