Featured Blogs

Latest

China, AFRINIC, and the Dangerous Precedent That Could Destabilize the Global Internet

A dispute over 6.2m IPv4 addresses at AFRINIC exposes how litigation and market incentives could erode regional stewardship, setting a precedent that risks turning the Internet's allocation system into a vehicle for global arbitrage. more

Competing Trademarks, One .BRAND: Making the Right Call in 2026

As ICANN opens its 2026 round, firms sharing trademarks must weigh applying for a .BRAND domain against legal risks and competitive loss, with evidence suggesting first movers gain advantage while objections rarely prevail. more

How DNSXplore Strengthens Internet Trust Across the Global DNSSEC Landscape

A once-trusted internet protocol is showing its age. DNSXplore, a global DNSSEC archive, exposes weaknesses, improves diagnostics and nudges adoption, helping secure the cryptographic chain underpinning online trust. more

Internet Number Resources Are Not Political Property

Internet number resources, once clerical entries, now underpin real economic value, exposing a mismatch between registry power and accountability, while misplaced political narratives obscure the case for decentralised, operator-led control. more

Africa Is Not a Digital Quarry

Africa's internet registry crisis reflects not abstract design flaws but sustained legal and market pressure, as scarce address resources are drawn into global arbitrage, challenging stewardship and exposing the fragility of regional digital governance. more

The Hyperscale IPv4 Moat: Analyzing AWS’s Latest 9M Address Acquisition

AWS has quietly acquired nine million more IPv4 addresses, turning internet scarcity into strategic leverage. As hyperscalers consolidate dwindling supply worldwide, IPv4 is evolving from legacy protocol into a profitable infrastructure moat for cloud giants. more

When Registry Power Detaches From Liability, It Detaches From Reality

IPv4 scarcity turned regional internet registries from clerks into gatekeepers of a valuable resource. Yet liability caps remain trivial, leaving powerful institutions with little accountability and incentives for conflict and structural breakdown ahead. more

From Guessing to Declaring: Why Geofeed is the Sovereign Foundation of Global Network Resilience

As IP addresses move across borders, outdated geolocation guesses cause service failures and regulatory risks. Geofeed and Signed Geofeed replace inference with verified declarations, promising accurate, resilient and sovereign foundations for global internet infrastructure governance. more

FCC Alert on Cybersecurity Risks

The FCC warns telecom companies of rising ransomware threats after attacks quadrupled since 2022. The agency urges stronger defenses including patching, multifactor authentication, network segmentation, and closer oversight of vendors and incident response planning. more

Iran’s Digital Arsenal: When Invisible Fences Rise in the Conflict

Iran's near-total internet blackout during airstrikes reveals how cyberattacks, sanctions and platform power can isolate a nation. The conflict shows digital infrastructure, satellites and cloud services becoming decisive weapons in modern geopolitical competition worldwide today. more

Building Trust in Digital Travel: Interoperability, Privacy, and the Future of Global Mobility

Digital travel credentials promise to streamline air travel by enabling privacy-preserving identity sharing across borders. Their success will depend on interoperable standards, trusted governance and gradual adoption alongside passports worldwide as governments airlines cooperate. more

Reflecting on WSIS+20 and Youth’s Role in Redefining Stakeholder Classification

At ICANN85, reflection on WSIS+20 highlights a quieter milestone: youth successfully secured recognition as a distinct stakeholder group, reshaping how Internet governance defines participation and offering a blueprint for other overlooked communities seeking voice today. more

The Internet No Longer Needs Permission

Governance rules built for the early Internet are struggling to keep pace with a global, automated network. As IPv4 markets mature and infrastructure becomes software-defined, registries may need to prioritise transparency and automation over permission. more

How Bad Actors Are Leveraging DNS: Looking at the Latest Trends

Bad actors are exploiting DNS with growing sophistication. New domains dominate threat infrastructure, daily user exposures are rising, and AI is accelerating attack creation, making DNS intelligence an increasingly critical early-warning system for modern cyber defence. more

The Rapid Evolution of Transport Lasers

Exploding internet traffic and AI demand are driving a rapid upgrade in fibre transport lasers, from early one gigabit systems to 400, 800 and even 1.6 terabit links reshaping backbone capacity worldwide as networks scale. more

Topics

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

DNS Security

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days