Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

The Poverty Penalty: How the RIR Model Taxes the Poor While Calling It Equality

Critics blame IPv4 markets for inequality, but registry rules long rewarded scale and imposed regressive costs. Scarcity was managed, not equalized, leaving poorer networks paying more for slower, less predictable access over time and regions. more

Regional Internet Registries’ Thick Governance Turns Uniqueness Into Double Extraction

Regional Internet registries, built for coordination, now sit atop scarce IPv4 assets while bearing little liability, suppressing capitalization and imposing "double extraction" that weakens operators, distorts markets and threatens the stability of global internet uniqueness. more

ICANN Seeks Community Input for 2026 NomCom Cycle (Comments Due 21 January 2026)

ICANN's Nominating Committee is calling for community input to help shape its 2026 leadership selection. Feedback on candidate criteria, job descriptions, and process improvements is due by 21 January 2026. more

Rising Costs of Broadband Construction

Despite steady expansion of fibre networks, the cost of building them is rising. New survey data show labour-heavy construction, higher aerial costs and persistent inflation pressures likely to push deployment expenses higher in 2026. more

The Internet No Longer Needs Permission

Governance rules built for the early Internet are struggling to keep pace with a global, automated network. As IPv4 markets mature and infrastructure becomes software-defined, registries may need to prioritise transparency and automation over permission. more

Nominations Open for 2026 Public Interest Registry (PIR) Board of Directors

The Internet Society is accepting nominations for two seats on the 2026 Board of the Public Interest Registry, the non-profit behind .ORG and other domains serving civil society. Deadline: 30 January 2026. more

Mandate Laundering: From RIR Fantasy to Transition Architecture

Private internet registries have inflated narrow technical roles into quasi-sovereign authority, laundering mandate through ritual and rhetoric; a fragile system now faces legal, economic and political reckoning, prompting calls for coordinated transition urgent global reform. more

Securing Africa’s Digital Future: Why Cybersecurity Must Lead Digital Transformation

Africa's rapid digital expansion, from fintech to e-government, is outpacing its cybersecurity capacity, leaving critical systems exposed and trust at risk unless governments embed security as a core pillar of development across the continent today. more

Who Authorizes Legitimacy if the Community Is Absent in the Redefined Procedural Space?

In African Internet governance, procedural authorship is quietly displacing community legitimacy. When conveners, not members, define reform processes, legitimacy becomes retrospective and trust erodes -- not by intention, but through unchecked structural roles. more

Thousands of Third-Party Domains Target Super Bowl Betting Brands

When major events like the Super Bowl are on the horizon, cybercriminals exploit public trust by creating fraudulent domains for fake betting sites, phishing, and malware distribution. CSC's research into top online sportsbooks highlights the hidden risks of dormant domains, which, though inactive, can quickly be repurposed for cyber attacks. Overlooked yet dangerous, these domains play a key role in impersonation, misinformation, and scams targeting event-driven traffic, underscoring the need for continuous monitoring of lookalike, dropped, re-registered, and newly registered domains. more

We Kept Saying IPv4 Prices Would Rise Again. Did Anyone Listen?

After a prolonged slump, IPv4 prices are rising as tightening supply meets sustained demand from cloud and AI infrastructure, signalling a market correction and diminishing opportunities for buyers who had delayed acquisitions. more

Modernizing the Registry: How LAC-2025-5 Addresses the Reality of IPv4 Scarcity

LACNIC's LAC-2025-5 proposal formalises IPv4 sub-assignments, bringing grey-market leasing into a framework, easing scarcity pressures, improving registry accuracy, and lowering barriers for smaller providers while preserving incentives to adopt IPv6, across Latin America and Caribbean. more

How DNSXplore Strengthens Internet Trust Across the Global DNSSEC Landscape

A once-trusted internet protocol is showing its age. DNSXplore, a global DNSSEC archive, exposes weaknesses, improves diagnostics and nudges adoption, helping secure the cryptographic chain underpinning online trust. more

The Hyperscale IPv4 Moat: Analyzing AWS’s Latest 9M Address Acquisition

AWS has quietly acquired nine million more IPv4 addresses, turning internet scarcity into strategic leverage. As hyperscalers consolidate dwindling supply worldwide, IPv4 is evolving from legacy protocol into a profitable infrastructure moat for cloud giants. more

Trusted Notifier Network (TNN) Core Concept 1: Unfair Cost Transfer and Reversal of Commercial Best

A flawed abuse-response system shifts costs from perpetrators to intermediaries, overwhelming enforcement. The Trusted Notifier Network seeks to realign incentives, curb low-quality reporting, and restore efficiency by embedding trust, accountability, and cost redistribution. more

Topics

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

DNS Security

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days