Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

The Logic, Fallacy and Flaws Associated With IPv4 Network Resource Transfers

Fifteen years after IPv4 exhaustion, a transfer market has reallocated scarce address space, enabling internet growth, despite uneven registry policies, opaque fees, and lingering resistance to a system that proved more pragmatic than planned reclamation. more

Munich Cybersecurity Conference 2026: Moving Into the Twilight Zone

At Munich's twin security gatherings, leaders warned that cyber conflict, transatlantic rifts and weaponised AI are pushing the rules-based order into a perilous transition, where deterrence falters, norms erode and digital sovereignty trumps multistakeholder ideals. more

ICANN’s Ultimate Demise?

ICANN's proposed overhaul of root server governance would empower a new council to revoke America's operator status, risking a clash with a resurgent Trump administration and potentially imperiling the multistakeholder model that underpins the internet's core infrastructure. more

AI: The Squandered Opportunity in India

India's AI summit promised a Global South rethink of digital governance. Instead, a weak declaration and Delhi's accession to America's Pax Silica exposed widening power asymmetries, leaving countries like Brazil outside the real circuitry of control. more

Why DNS-Level Piracy Enforcement Is a Trap

Efforts to combat online piracy are pushing courts to weaponise the Internet's naming system. Turning DNS operators into enforcement agents may deliver quick takedowns, but risks collateral damage, jurisdictional conflict and long-term fragmentation of the Internet. more

When Registry Power Detaches From Liability, It Detaches From Reality

IPv4 scarcity turned regional internet registries from clerks into gatekeepers of a valuable resource. Yet liability caps remain trivial, leaving powerful institutions with little accountability and incentives for conflict and structural breakdown ahead. more

The IRP Docket Speaks Louder Than Theory - A Response to Charles Mok on ICANN and AI Governance

A critique of ICANN's multi-stakeholder model argues that its accountability record, revealed through more than a dozen IRP disputes, shows structural failures that should caution policymakers seeking institutional blueprints for governing artificial intelligence systems globally. more

You Are Invited to Engage in Project Jake: Shaping the Future of DNS Data Governance

Project Jake invites global DNS stakeholders to test JADDAR, a privacy-respecting framework for secure access to registration data, aiming to reduce regulatory fragmentation and modernise domain governance through collaborative, policy-aligned engineering solutions. more

The Geopolitical Protocol: Can QUIC and LEO Satellites Mitigate the Risks of Fragile Subsea Cables?

As geopolitical tensions expose the fragility of subsea cables, Low Earth Orbit satellites and the QUIC protocol promise a more resilient internet by diversifying routes, preserving session continuity, and redefining control over global data flows. more

Iran’s Digital Arsenal: When Invisible Fences Rise in the Conflict

Iran's near-total internet blackout during airstrikes reveals how cyberattacks, sanctions and platform power can isolate a nation. The conflict shows digital infrastructure, satellites and cloud services becoming decisive weapons in modern geopolitical competition worldwide today. more

FCC Alert on Cybersecurity Risks

The FCC warns telecom companies of rising ransomware threats after attacks quadrupled since 2022. The agency urges stronger defenses including patching, multifactor authentication, network segmentation, and closer oversight of vendors and incident response planning. more

Do We Need Alignment Between Internet Governance and AI Governance?

A debate over aligning internet and AI governance reveals stark differences in origin, incentives and power. While lessons from ICANN's multi-stakeholder model endure, AI's corporate dominance and geopolitical rivalry demand new, bottom-up approaches. more

The Challenge of Adding Fiber to Poles

An FCC ruling in a dispute between Comcast and Appalachian Power clarifies pole attachment cost rules, but exposes how regulatory delays and uncooperative utilities can slow fiber deployment and raise costs for broadband providers. more

Building Trust in Digital Travel: Interoperability, Privacy, and the Future of Global Mobility

Digital travel credentials promise to streamline air travel by enabling privacy-preserving identity sharing across borders. Their success will depend on interoperable standards, trusted governance and gradual adoption alongside passports worldwide as governments airlines cooperate. more

How Internet Sovereignty Is Reshaping Company Tech Stacks

As governments assert internet sovereignty, global networks are quietly fracturing. Data localisation, sovereign cloud rules and political risk are forcing companies to redesign technology stacks once built for a borderless internet. more

Topics

DNS

Sponsored byDNIB.com

DNS Security

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days