Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

The Growing Role of Threat Intelligence in Internet Infrastructure Security

Threat intelligence is shifting from a passive feed to a core operational layer, helping infrastructure defenders connect fragmented signals, identify recurring attack patterns, and prioritise responses in an increasingly modular and fast-moving cybercrime ecosystem. more

The AI Naming Gap - and Why the Legacy Namespace Won’t Wait for ICANN to Fill It

A surge in AI startups has exposed a domain-name shortage as premium .ai addresses vanish. With ICANN's next round years away, legacy TLDs and repurposed namespaces are racing to capture unmet demand. more

Sovereignty Inversion: How RIRs Reduced National Sovereignty to a US$100 Liability Cap

Regional internet registries, once coordinators of technical scarcity, now effectively cap liability at $100 while retaining control over national numbering systems, shifting risk to states and entrenching a governance model critics argue today inverts sovereignty. more

Five Things the UN Permanent Mechanism on Cybersecurity Must Actually Deliver

The UN's new permanent cybersecurity mechanism promises continuity after decades of fleeting forums, yet risks irrelevance unless states enforce existing law, bridge cybercrime divides, address AI threats, build practical capacity, and include non-state expertise meaningfully. more

Moving Beyond Associated Domain Checks: The Urgent Need to Ban Short-Term Domain Leasing

ICANN's new DNS abuse rules mark progress, yet short-term domain leasing enables fleeting, hard-to-detect attacks. A proposed 30-day minimum lease could curb cybercrime by undermining the economics of weaponised parked domains. more

Concerns Over America’s WiFi Router Ban

America's FCC has barred new foreign-made consumer routers on security grounds, tightening supply for ISPs and households while raising costs and risking technological lag unless domestic manufacturing or approvals quickly expand in coming years significantly. more

Running-Code Betrayal: How the RIR System Turned Consensus Against the Technical Community

A dispute over African IP governance exposes a flaw in the RIR system, where thin policy, weak accountability and institutional self preservation risk overriding running networks and undermining the technical legitimacy that sustained global coordination. more

Securing Digital Brand Borders in a Fragmented World

GlobalBlock's expansion into China and Germany signals a shift from reactive brand protection to centralized prevention, as firms seek scalable, cost efficient defences against proliferating AI driven domain abuse worldwide amid a fragmented digital landscape. more

Africa Can’t Skip IPv4 on the Road to IPv6

Africa's push toward IPv6 cannot bypass IPv4 scarcity, as uneven infrastructure, market dynamics, and governance disputes raise costs, entrench inequality, and risk turning transitional address shortages into a lasting brake on digital development across regions. more

Topics

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

DNS Security

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days