Governance rules built for the early Internet are struggling to keep pace with a global, automated network. As IPv4 markets mature and infrastructure becomes software-defined, registries may need to prioritise transparency and automation over permission. more
Despite steady expansion of fibre networks, the cost of building them is rising. New survey data show labour-heavy construction, higher aerial costs and persistent inflation pressures likely to push deployment expenses higher in 2026. more
In African Internet governance, procedural authorship is quietly displacing community legitimacy. When conveners, not members, define reform processes, legitimacy becomes retrospective and trust erodes -- not by intention, but through unchecked structural roles. more
When major events like the Super Bowl are on the horizon, cybercriminals exploit public trust by creating fraudulent domains for fake betting sites, phishing, and malware distribution. CSC's research into top online sportsbooks highlights the hidden risks of dormant domains, which, though inactive, can quickly be repurposed for cyber attacks. Overlooked yet dangerous, these domains play a key role in impersonation, misinformation, and scams targeting event-driven traffic, underscoring the need for continuous monitoring of lookalike, dropped, re-registered, and newly registered domains. more
After a prolonged slump, IPv4 prices are rising as tightening supply meets sustained demand from cloud and AI infrastructure, signalling a market correction and diminishing opportunities for buyers who had delayed acquisitions. more
Regional Internet registries, built for coordination, now sit atop scarce IPv4 assets while bearing little liability, suppressing capitalization and imposing "double extraction" that weakens operators, distorts markets and threatens the stability of global internet uniqueness. more
Africa's rapid digital expansion, from fintech to e-government, is outpacing its cybersecurity capacity, leaving critical systems exposed and trust at risk unless governments embed security as a core pillar of development across the continent today. more
AWS has quietly acquired nine million more IPv4 addresses, turning internet scarcity into strategic leverage. As hyperscalers consolidate dwindling supply worldwide, IPv4 is evolving from legacy protocol into a profitable infrastructure moat for cloud giants. more
As ICANN opens its 2026 round, firms sharing trademarks must weigh applying for a .BRAND domain against legal risks and competitive loss, with evidence suggesting first movers gain advantage while objections rarely prevail. more
A once-trusted internet protocol is showing its age. DNSXplore, a global DNSSEC archive, exposes weaknesses, improves diagnostics and nudges adoption, helping secure the cryptographic chain underpinning online trust. more
In January 2025, President Donald Trump -- now serving his second non-consecutive term -- unveiled a sweeping tariff regime designed to recalibrate America's global trade relationships. Among the measures was a blanket 10% tariff on all imported goods, accompanied by higher, so-called "reciprocal" tariffs targeting specific regions: 20% on EU imports and a dramatic 145% on goods from China. While these heightened rates were temporarily paused on April 9, 2025, for 90 days (excluding China), the 10% baseline tariff remains broadly in effect, symbolizing a shift toward an overtly protectionist economic doctrine. more
Internet number resources, once clerical entries, now underpin real economic value, exposing a mismatch between registry power and accountability, while misplaced political narratives obscure the case for decentralised, operator-led control. more
AI-powered "vibe-coding" is transforming domain registration from manual search into automated, conversational infrastructure, embedding domains directly into software workflows while elevating them into machine-verified trust anchors in an increasingly AI-mediated internet. more
Kinetic attacks on Gulf data centres expose the cloud's physical fragility, recasting AI infrastructure as strategic targets and accelerating bunkerisation, while outdated data laws leave firms choosing between legal compliance and digital survival. more
Africa's looming AI rules expose a deeper problem: foreign-controlled infrastructure, weak enforcement capacity and externally governed data flows are eroding digital sovereignty, leaving states unable to regulate, protect citizens or meet global obligations. more
Sponsored byCSC
Sponsored byRadix
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byWhoisXML API