Networks are typically built to provide certain services at an expected scale. The rationale for this focused objective is entirely reasonable: to overachieve would be inefficient and costly. So, we build service infrastructure to a level of sufficient capability to meet expectations and no more. In ideal conditions, this leads to a widely deployed and highly efficient infrastructure that is capable of supporting a single service profile. more
The debate surrounding digital sovereignty has gained momentum in recent years, particularly within BRICS nations, where governments seek to assert greater control over their digital ecosystems. Proponents of digital sovereignty often frame it as a necessary countermeasure against foreign technological dominance, positioning it as either a "positive" force- fostering local innovation and self-reliance- or a "negative" one- fueling authoritarian control and economic isolation. more
Big Tech firms should back Africa's AI future by investing in its vast energy resources and infrastructure needs. Doing so offers a strategic answer to growing data demands and an opportunity for shared prosperity. more
Negotiation processes in the UN are remembered not just for what came out of them, but also for what they were like, who participated, and how they were conducted. People who participated in the first World Summit on the Information Society (WSIS) back in 2003 and 2005 often talk about the process, its challenges and its achievements. more
Earlier this week, Poland’s new President, Karol Nawrocki, vetoed amendments to the Act on Assistance to Citizens of Ukraine, provoking debate over critical satellite connectivity. Deputy Prime Minister and Minister of Digital Affairs Krzysztof Gawkowski warned that the veto “de facto switched off Starlink for Ukraine,” potentially disrupting connectivity for hospitals, schools, and government operations. more
2025 is not a banner year for the status quo. A fashion for deregulation, ignoring processes and questioning whatever was long-established is finding enough adherents that even things which work well are being upended. That's why those looking for leverage to use in hurried dealmaking, or countries with plans to rebalance where digital power lies, may find a handy tool in ICANN. more
Cybercriminals live by the tenet "If it ain't broke, don't fix it." They'll use the same tactics repeatedly until they no longer work, then switch things up. That's why CISOs and their security teams maintain constant vigilance. Underscoring this, recent analysis of global DNS activity found that new domains continue to be a major tactic for bad actors. more
Netscout recently released its latest Threat Intelligence Report that documents DDoS attacks in the second half of 2024. As has been the trend for many years, the largest target of DDoS attacks has been ISP networks. There were over 8.9 million DDoS attacks documented in the second half of last year, up 12.75% over the first half of the year. more
The arrangements regarding the composition and organisation of the provision and operation of authoritative root servers are one of the more long-lasting aspects of the public Internet. In the late 1980s, Jon Postel, as the IANA, worked with a small set of interested organisations to provide this service. It was informally arranged, without contracts and without payment of any form. more
The NetBeacon Institute is pleased to publish its White Paper: Proposal for PDPs on DNS Abuse. We created this paper to support and advance ICANN Community discussions on potential policy development related to DNS Abuse. From our unique perspective, we believe there are a number of issues that are constrained enough to be a successful ICANN PDP and can make a meaningful difference in our collective work against DNS Abuse. more
Through 2024, IPv4 leasing stayed steady at about $0.50 per IP per month, even as purchase prices diverged by block size. Large blocks (like /16) corrected notably while smaller blocks (/20 - /24) remained comparatively firm. That spread reflected shifting enterprise behavior (more surgical allocations, less speculative buying) and the resilience of subscription-like leasing in unstable conditions. more
Today, I share a warning about serious changes to the Community Priority Evaluation (CPE) of the New gTLD Applicant Guidebook. They are not driven by public comment, but by a few voices within the SubPro Implementation Review Team - and they are very likely to lead to disastrous misappropriation of well-known community names, including those of Tribes, Indigenous Peoples and NGOs around the world. more
As the global digital order enters an era of intensifying geopolitical tension, debates over digital sovereignty have re-emerged as a defining fault line in Internet governance. At stake is not merely who controls data or infrastructure within national borders but whether the vision of a globally interoperable, open Internet, one of WSIS's founding principles, can be meaningfully sustained. more
Dave Taht died on April 1st. I met him only recently, and never in person, but his passing saddens me. His technical work and evangelism have improved the Internet, and I will give some examples of his contributions to the Internet community and users, but I am sad because he was a good person -- idealistic, unselfish, open, and funny. I'll miss him. First, his contributions, then his values. more
The ability to rank results according to the level of threat they pose (based on factors such as, for example, the extent to which a webpage relates to a brand of interest) is a key component of many brand protection services. The prioritisation process has a number of purposes, including the identification of: (a) priority targets for further analysis; (b) candidates for content tracking (i.e. regular reinspection of content or configuration, and the generation of an alert if high-concern findings are identified) - as may be appropriate in cases where a domain name presents a high potential level of risk but is not currently associated with any live site content; and (c) priority targets for enforcement actions. more
Sponsored byVerisign
Sponsored byCSC
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byDNIB.com
Sponsored byWhoisXML API
Sponsored byRadix