Unlike past technological shifts, artificial intelligence is automating high-skilled professions before low-skilled ones. This reversal challenges long-held assumptions about job security, expertise, and governance, forcing policymakers to rethink regulation, trust, and digital sovereignty. more
As Internet governance fragments in 2026, authority shifts from open, multistakeholder forums to state-led security regimes, legal instruments, and alliance-based cooperation, challenging longstanding institutions and reshaping global norms through enforcement rather than consensus. more
The Secure Hosting Alliance has introduced a certification programme to establish clear, verifiable standards for internet hosting providers, aiming to improve accountability, boost transparency, and strengthen the trust that underpins global online infrastructure. more
Over the past decade, cloud computing has experienced explosive growth, evolving from its nascent stage to widespread adoption and fundamentally changing how businesses and individuals use information technology. At the same time, traditional on-premise computing, while still having its use cases, has been progressively integrated with, and often even controlled by, Cloud Service Providers (CSPs) in many aspects. more
OpenVault's latest broadband report shows U.S. households using more data, with uploads rising faster than downloads and a major shift toward midrange speed tiers. Growing gaming, streaming, and cloud activity continues to reshape network demand and subscriber behavior. more
Granular regulation offers a new governance framework for AI, blending flexibility with enforceability. By translating broad principles into risk-sensitive, technical mandates, it overcomes the rigidity of rule-based models and the vagueness of principle-based approaches. more
The World Summit on Information Society (WSIS) convened by World leaders in 2003 and 2005 following the realization of the crucial roles of Information and Communications Technologies (ICTs) (also known in the industry as the Internet) played in economic growth and development. Since 2005, ICTs have added more than $10tr to the global economy (Oxford Economics, 2020). more
What might look like a routine procedural dispute over votes is, in fact, a glaring reminder that Regional Internet Registries (RIRs) are now geopolitical pressure points - and that ICANN's oversight of RIR governance must evolve to meet these risks. On 23 June 2025, AFRINIC, the RIR that serves Africa, attempted to hold long-delayed elections to restore stability after years of legal battles and board paralysis. Yet instead of restoring trust, the process imploded almost immediately. more
With IPv4 addresses fetching up to $30 apiece and IPv6 adoption lagging, companies may be sitting on hidden digital assets. A strategic audit could unlock unexpected revenue and enhance long-term infrastructure planning. more
As smartphones become the primary gateway to the internet for billions, a critical question emerges: does app-based digital fluency prepare users for the demands of computer-based work in a modern economy? more
What began as an emergency response evolved into critical wartime infrastructure. Ukraine's experience with Starlink reveals the strategic risks and benefits of relying on privately operated networks for national resilience and defence. more
Last month marked 40 years since the registration of the world's first ever .com domain name – symbolics.com – in March 1985. It’s a time to reflect both on the role .com has played in the evolution and growth of the internet over the past 40 years, and on the importance of ensuring that .com remains secure, stable, and resilient for the billions of people who rely on it every day. Who could have imagined in 1985 that over the course of the next four decades, internet users would register hundreds of millions of domain names... more
When major events like the Super Bowl are on the horizon, cybercriminals exploit public trust by creating fraudulent domains for fake betting sites, phishing, and malware distribution. CSC's research into top online sportsbooks highlights the hidden risks of dormant domains, which, though inactive, can quickly be repurposed for cyber attacks. Overlooked yet dangerous, these domains play a key role in impersonation, misinformation, and scams targeting event-driven traffic, underscoring the need for continuous monitoring of lookalike, dropped, re-registered, and newly registered domains. more
In January 2025, President Donald Trump -- now serving his second non-consecutive term -- unveiled a sweeping tariff regime designed to recalibrate America's global trade relationships. Among the measures was a blanket 10% tariff on all imported goods, accompanied by higher, so-called "reciprocal" tariffs targeting specific regions: 20% on EU imports and a dramatic 145% on goods from China. While these heightened rates were temporarily paused on April 9, 2025, for 90 days (excluding China), the 10% baseline tariff remains broadly in effect, symbolizing a shift toward an overtly protectionist economic doctrine. more
Internet governance is shifting from participatory forums to security-driven mandates. As authority accelerates ahead of legitimacy, technical systems face growing instability and operators absorb the risks of politically motivated control. more
Sponsored byRadix
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byWhoisXML API
Sponsored byCSC
Sponsored byVerisign