Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

The Growing Role of Threat Intelligence in Internet Infrastructure Security

Threat intelligence is shifting from a passive feed to a core operational layer, helping infrastructure defenders connect fragmented signals, identify recurring attack patterns, and prioritise responses in an increasingly modular and fast-moving cybercrime ecosystem. more

The AI Naming Gap - and Why the Legacy Namespace Won’t Wait for ICANN to Fill It

A surge in AI startups has exposed a domain-name shortage as premium .ai addresses vanish. With ICANN's next round years away, legacy TLDs and repurposed namespaces are racing to capture unmet demand. more

Sovereignty Inversion: How RIRs Reduced National Sovereignty to a US$100 Liability Cap

Regional internet registries, once coordinators of technical scarcity, now effectively cap liability at $100 while retaining control over national numbering systems, shifting risk to states and entrenching a governance model critics argue today inverts sovereignty. more

Securing Africa’s Digital Future: Why Cybersecurity Must Lead Digital Transformation

Africa's rapid digital expansion, from fintech to e-government, is outpacing its cybersecurity capacity, leaving critical systems exposed and trust at risk unless governments embed security as a core pillar of development across the continent today. more

The Internet That Works for Some: Universal Acceptance Failures Across Asia Pacific

Across Asia Pacific, millions are excluded from digital services because systems fail to recognise non Latin scripts, exposing how flawed design assumptions about internet users entrench inequality across the region in welfare, finance and education. more

Filling the Sky with Satellites

Low Earth orbit is crowding as Starlink, Amazon, China and others race to deploy thousands of satellites, promising faster broadband while intensifying global competition, orbital congestion concerns and a push for direct-to-device connectivity. more

Trusted Notifier Network (TNN) Core Concept 1: Unfair Cost Transfer and Reversal of Commercial Best

A flawed abuse-response system shifts costs from perpetrators to intermediaries, overwhelming enforcement. The Trusted Notifier Network seeks to realign incentives, curb low-quality reporting, and restore efficiency by embedding trust, accountability, and cost redistribution. more

Africa’s AI Governance Crisis Is Not a Regulatory Gap, It Is a Sovereignty Emergency

Africa's looming AI rules expose a deeper problem: foreign-controlled infrastructure, weak enforcement capacity and externally governed data flows are eroding digital sovereignty, leaving states unable to regulate, protect citizens or meet global obligations. more

Mandate Laundering: From RIR Fantasy to Transition Architecture

Private internet registries have inflated narrow technical roles into quasi-sovereign authority, laundering mandate through ritual and rhetoric; a fragile system now faces legal, economic and political reckoning, prompting calls for coordinated transition urgent global reform. more

The Kinetic Frontier: Lessons From Geopolitical Violence and the Bunkerization of AI Infrastructure

Kinetic attacks on Gulf data centres expose the cloud's physical fragility, recasting AI infrastructure as strategic targets and accelerating bunkerisation, while outdated data laws leave firms choosing between legal compliance and digital survival. more

Topics

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

DNS Security

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days