Featured Blogs

Latest

The New Space Race for Connectivity: Satellite Internet and Critical Infrastructure

Satellite internet is from backup to core infrastructure, as LEO constellations, non-terrestrial networks and direct-to-device services reshape connectivity, forcing governments and operators to rethink resilience, sovereignty and the architecture of the internet. more

No Safe Harbor: SCOTUS Scuttles the DMCA

America's Supreme Court, in Cox v Sony, recast online copyright liability, effectively sidelining the DMCA safe harbor and replacing it with a narrow inducement standard that leaves service providers little obligation to meaningfully police infringement. more

CaribNOG Enters Its Institutional Era

CaribNOG's 32nd forum in CuraƧao marks a shift from volunteer roots to institutional structure, as the Caribbean network community formalises programmes, expands research, and positions itself to tackle climate, geopolitical, and infrastructure pressures. more

The Historical Mandate of the RIR System

The history of the Regional Internet Registry system shows it was designed as a community-governed framework, not a passive ledger, with legitimacy rooted in delegated authority, open policy development, and multistakeholder coordination from its inception. more

Afnic Reports Record Year for .fr Domain Names in 2025

Afnic's 2025 review finds .fr registrations at a record 4.3m, with strong new domain creation and steady retention, even as competition from .com and shifting digital trends temper expectations for future growth in 2026 overall. more

Domain Security Report: Unicorns Show Strong Adoption in Key Domain Security Measures

Unicorn firms lead in DNS-based security adoption, signaling technical maturity, while Global 2000 rely on enterprise registrars. Gaps in redundancy and brand protection expose supply chain risks as cyberattacks intensify across industries globally today. more

Why Africa’s Cybersecurity Problem Has Nothing to Do with Hackers

Africa's cybersecurity failures stem less from sophisticated hackers than from insecure system design, weak governance and limited skills, leaving institutions exposed and shifting the challenge from external threats to internal accountability and resilience. more

China and the Geopolitics of Africa’s 6.2 Million IPv4 Addresses

AFRINIC's fight over 6.2 million IPv4 addresses exposes how legal pressure, offshore vehicles and scarcity economics can strip Africa of leverage, turning a technical dispute into a test of sovereignty, institutional resilience and Internet governance. more

Modernizing the Registry: How LAC-2025-5 Addresses the Reality of IPv4 Scarcity

LACNIC's LAC-2025-5 proposal formalises IPv4 sub-assignments, bringing grey-market leasing into a framework, easing scarcity pressures, improving registry accuracy, and lowering barriers for smaller providers while preserving incentives to adopt IPv6, across Latin America and Caribbean. more

The Fractured Web: How Internet Fragmentation Threatens Our Connected World

As governments, firms and engineers reshape networks, the internet is fragmenting into rival systems. Interoperability erodes, raising costs, curbing rights and weakening resilience, with global growth, innovation and cooperation increasingly at risk. more

The Kinetic Frontier: Lessons From Geopolitical Violence and the Bunkerization of AI Infrastructure

Kinetic attacks on Gulf data centres expose the cloud's physical fragility, recasting AI infrastructure as strategic targets and accelerating bunkerisation, while outdated data laws leave firms choosing between legal compliance and digital survival. more

Mandate Laundering: From RIR Fantasy to Transition Architecture

Private internet registries have inflated narrow technical roles into quasi-sovereign authority, laundering mandate through ritual and rhetoric; a fragile system now faces legal, economic and political reckoning, prompting calls for coordinated transition urgent global reform. more

Africa’s AI Governance Crisis Is Not a Regulatory Gap, It Is a Sovereignty Emergency

Africa's looming AI rules expose a deeper problem: foreign-controlled infrastructure, weak enforcement capacity and externally governed data flows are eroding digital sovereignty, leaving states unable to regulate, protect citizens or meet global obligations. more

Filling the Sky with Satellites

Low Earth orbit is crowding as Starlink, Amazon, China and others race to deploy thousands of satellites, promising faster broadband while intensifying global competition, orbital congestion concerns and a push for direct-to-device connectivity. more

Trusted Notifier Network (TNN) Core Concept 1: Unfair Cost Transfer and Reversal of Commercial Best

A flawed abuse-response system shifts costs from perpetrators to intermediaries, overwhelming enforcement. The Trusted Notifier Network seeks to realign incentives, curb low-quality reporting, and restore efficiency by embedding trust, accountability, and cost redistribution. more

Topics

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

DNS Security

Sponsored byWhoisXML API

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days