Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

The Growing Role of Threat Intelligence in Internet Infrastructure Security

Threat intelligence is shifting from a passive feed to a core operational layer, helping infrastructure defenders connect fragmented signals, identify recurring attack patterns, and prioritise responses in an increasingly modular and fast-moving cybercrime ecosystem. more

Internet Number Resources Are Not Political Property

Internet number resources, once clerical entries, now underpin real economic value, exposing a mismatch between registry power and accountability, while misplaced political narratives obscure the case for decentralised, operator-led control. more

The Rapid Evolution of Transport Lasers

Exploding internet traffic and AI demand are driving a rapid upgrade in fibre transport lasers, from early one gigabit systems to 400, 800 and even 1.6 terabit links reshaping backbone capacity worldwide as networks scale. more

Reflecting on WSIS+20 and Youth’s Role in Redefining Stakeholder Classification

At ICANN85, reflection on WSIS+20 highlights a quieter milestone: youth successfully secured recognition as a distinct stakeholder group, reshaping how Internet governance defines participation and offering a blueprint for other overlooked communities seeking voice today. more

When the Internet Doesn’t Recognize You: Universal Acceptance and India’s Welfare Crisis

India's digital welfare systems, built without universal acceptance, have excluded millions from vaccines, wages and food, revealing how technical design choices can entrench inequality and reshape access to basic rights across rural regions today in India. more

The Ghost Asset on Telco Balance Sheets: Using IPv4 to Fund the AI Transition

Hidden on telecom balance sheets, legacy IPv4 address space is emerging as a monetizable asset. Leasing underutilized blocks can generate recurring cash flow that helps fund AI infrastructure, modernization, and network investment without increasing debt. more

The AI Naming Gap - and Why the Legacy Namespace Won’t Wait for ICANN to Fill It

A surge in AI startups has exposed a domain-name shortage as premium .ai addresses vanish. With ICANN's next round years away, legacy TLDs and repurposed namespaces are racing to capture unmet demand. more

The Internet That Works for Some: Universal Acceptance Failures Across Asia Pacific

Across Asia Pacific, millions are excluded from digital services because systems fail to recognise non Latin scripts, exposing how flawed design assumptions about internet users entrench inequality across the region in welfare, finance and education. more

Beyond Connectivity: How Submarine Cable Resilience Dictates Digital Sovereignty in the Age of Fragmented Governance

Subsea cables underpin global data flows, yet resilience, control and deep sea access now define digital sovereignty as governance fragments, hyperscalers consolidate ownership, and states prioritize survivability over efficiency in an increasingly contested geopolitical seabed. more

Fake Domains, Real Damage: What the Latest Data Reveals

Third-party domains exploiting brand names are proliferating, with 88% of homoglyphs externally owned. Many remain dormant yet email-enabled, creating scalable phishing risks as attackers increasingly target trust rather than infrastructure. more

Sovereignty Inversion: How RIRs Reduced National Sovereignty to a US$100 Liability Cap

Regional internet registries, once coordinators of technical scarcity, now effectively cap liability at $100 while retaining control over national numbering systems, shifting risk to states and entrenching a governance model critics argue today inverts sovereignty. more

Africa’s Community Networks Offer a Local Path to Inclusive and Resilient Connectivity

Community networks, locally built and governed, are emerging across Africa as cost-effective tools to extend connectivity, bolster digital sovereignty, and improve cyber resilience, despite regulatory, financial, and technical constraints that hinder broader adoption. more

Building RIPE SEE: A Conversation With Jan Žorž About Community, Trust, and the Work Behind a Regional Event

Jan Žorž reflects on SEE RIPE's role in uniting a fragmented region, where trust built through informal exchange now underpins internet resilience and helps align engineers with policymakers as regulatory pressures intensify. more

Trusted Notifier Network (TNN) Core Concept 2: Building a Chain of Indemnity

TNN proposes a contractual chain of indemnity to shift legal risk in global takedowns, replacing patchy statutory protections with enforceable accountability and a fund that makes good-faith action commercially viable for smaller intermediaries. more

IP Reputation for AI Teams: The Infrastructure Concept Nobody Explains

As AI agents scale, IP reputation emerges as a hidden constraint, shaping access to external systems and degrading performance. Managing network identity, not just models, is becoming essential for reliable data collection. more

Topics

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

DNS Security

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days