Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Do We Need Alignment Between Internet Governance and AI Governance?

A debate over aligning internet and AI governance reveals stark differences in origin, incentives and power. While lessons from ICANN's multi-stakeholder model endure, AI's corporate dominance and geopolitical rivalry demand new, bottom-up approaches. more

Is the Broadband Industry Reaching Maturity?

Craig Moffett, of MoffettNathanson, was recently quoted in FierceTelecom asking if the broadband industry is reaching maturity. Other than in rural areas, where many homes are still hungry for better broadband, the broadband penetration rate in cities is approaching 90%. It's a fair question to ask if there is room for much more growth in the industry. This is a question that has bounced around for the last five years. more

Africa’s Community Networks Offer a Local Path to Inclusive and Resilient Connectivity

Community networks, locally built and governed, are emerging across Africa as cost-effective tools to extend connectivity, bolster digital sovereignty, and improve cyber resilience, despite regulatory, financial, and technical constraints that hinder broader adoption. more

Five Things the UN Permanent Mechanism on Cybersecurity Must Actually Deliver

The UN's new permanent cybersecurity mechanism promises continuity after decades of fleeting forums, yet risks irrelevance unless states enforce existing law, bridge cybercrime divides, address AI threats, build practical capacity, and include non-state expertise meaningfully. more

African SMEs Are Paying the Price for Global Digital Policy Blind Spots

Global digital policy frameworks often overlook the realities of African SMEs, imposing compliance standards shaped by mature economies and infrastructure, thereby constraining innovation, competitiveness, and inclusion in the digital economy. more

Governing Through Liability: Cox v. Sony and the Fragmentation of the Internet

Cox v. Sony narrows intermediary liability, insisting on intent over knowledge. In doing so, it preserves infrastructure neutrality, resists privatized enforcement, and sharpens a growing divide between American and European models of Internet governance. more

Afnic Reports Record Year for .fr Domain Names in 2025

Afnic's 2025 review finds .fr registrations at a record 4.3m, with strong new domain creation and steady retention, even as competition from .com and shifting digital trends temper expectations for future growth in 2026 overall. more

Domain Security Report: Unicorns Show Strong Adoption in Key Domain Security Measures

Unicorn firms lead in DNS-based security adoption, signaling technical maturity, while Global 2000 rely on enterprise registrars. Gaps in redundancy and brand protection expose supply chain risks as cyberattacks intensify across industries globally today. more

How Bad Actors Are Leveraging DNS: Looking at the Latest Trends

Bad actors are exploiting DNS with growing sophistication. New domains dominate threat infrastructure, daily user exposures are rising, and AI is accelerating attack creation, making DNS intelligence an increasingly critical early-warning system for modern cyber defence. more

How to Restore Trust Into Cyberspace? Beer Has the Answer!

Let's face it, when it comes to digital technologies, fundamental human rights are not on top of the digital agenda. They seem irrelevant and remote, even an obstacle to digital innovation and opportunities. We are quick to pay lip service to them, but we permit the profit motive and stakeholder self-interests to override human rights principles. It does not matter how right and righteous the cause might be; to be implemented, it must be profitable or carry stakeholder benefits. more

Would the “Mensch” in the Room Please Stand Up!

Wolfgang Kleinwaechter, in his Internet Governance Outlook 2024, reminded us that 2024, as the years before and future years, will be pivotal for Internet Governance processes. We eagerly await Wolfgang's missives every January, and we trust what we read because we know him, and we trust CircleID. We should be grateful and cherish this example of straightforward, digitally enabled, and trust-based human communication... more

Legacy or Not to Be?

Over the years, most communication service providers will build up their information systems bit by bit. Every so often as new services are required, a new process and vendor product is installed. Several years later, there can be many legacy processes and vendor products chosen and designed by many different people. Generally, each implementation team is diligently aware of these legacy processes and vendor products. But in a lot of cases the whole enterprise architecture becomes very convoluted and complicated. more

Is Zoom’s Server Security Just as Vulnerable as the Client Side?

Zoom programmers made elementary security errors when coding, and did not use protective measures that compiler toolchains make available. It's not a great stretch to assume that similar flaws afflict their server implementations. While Mudge noted that Zoom's Windows and Mac clients are (possibly accidentally) somewhat safer than the Linux client, I suspect that their servers run on Linux.Were they written with similar lack of attention to security? more

No Safe Harbor: SCOTUS Scuttles the DMCA

America's Supreme Court, in Cox v Sony, recast online copyright liability, effectively sidelining the DMCA safe harbor and replacing it with a narrow inducement standard that leaves service providers little obligation to meaningfully police infringement. more

Building RIPE SEE: A Conversation With Jan Žorž About Community, Trust, and the Work Behind a Regional Event

Jan Žorž reflects on SEE RIPE's role in uniting a fragmented region, where trust built through informal exchange now underpins internet resilience and helps align engineers with policymakers as regulatory pressures intensify. more

Topics

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

DNS Security

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days