Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

The Growing Role of Threat Intelligence in Internet Infrastructure Security

Threat intelligence is shifting from a passive feed to a core operational layer, helping infrastructure defenders connect fragmented signals, identify recurring attack patterns, and prioritise responses in an increasingly modular and fast-moving cybercrime ecosystem. more

The AI Naming Gap - and Why the Legacy Namespace Won’t Wait for ICANN to Fill It

A surge in AI startups has exposed a domain-name shortage as premium .ai addresses vanish. With ICANN's next round years away, legacy TLDs and repurposed namespaces are racing to capture unmet demand. more

Sovereignty Inversion: How RIRs Reduced National Sovereignty to a US$100 Liability Cap

Regional internet registries, once coordinators of technical scarcity, now effectively cap liability at $100 while retaining control over national numbering systems, shifting risk to states and entrenching a governance model critics argue today inverts sovereignty. more

Securing Africa’s Digital Future: Why Cybersecurity Must Lead Digital Transformation

Africa's rapid digital expansion, from fintech to e-government, is outpacing its cybersecurity capacity, leaving critical systems exposed and trust at risk unless governments embed security as a core pillar of development across the continent today. more

The Internet That Works for Some: Universal Acceptance Failures Across Asia Pacific

Across Asia Pacific, millions are excluded from digital services because systems fail to recognise non Latin scripts, exposing how flawed design assumptions about internet users entrench inequality across the region in welfare, finance and education. more

Filling the Sky with Satellites

Low Earth orbit is crowding as Starlink, Amazon, China and others race to deploy thousands of satellites, promising faster broadband while intensifying global competition, orbital congestion concerns and a push for direct-to-device connectivity. more

Trusted Notifier Network (TNN) Core Concept 1: Unfair Cost Transfer and Reversal of Commercial Best

A flawed abuse-response system shifts costs from perpetrators to intermediaries, overwhelming enforcement. The Trusted Notifier Network seeks to realign incentives, curb low-quality reporting, and restore efficiency by embedding trust, accountability, and cost redistribution. more

Topics

Domain Names

Sponsored byVerisign

DNS Security

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days