Featured Blogs

Latest

Authority Formation and Legitimacy in Parallel Governance Tracks

Africa's internet governance faces parallel tracks as AFRINIC's community-led reforms unfold alongside a continent-wide blueprint, raising questions over whether legitimacy will stem from participatory processes or increasingly coordinated external alignment. more

Building RIPE SEE: A Conversation With Jan Žorž About Community, Trust, and the Work Behind a Regional Event

Jan Žorž reflects on SEE RIPE's role in uniting a fragmented region, where trust built through informal exchange now underpins internet resilience and helps align engineers with policymakers as regulatory pressures intensify. more

Beyond Connectivity: How Submarine Cable Resilience Dictates Digital Sovereignty in the Age of Fragmented Governance

Subsea cables underpin global data flows, yet resilience, control and deep sea access now define digital sovereignty as governance fragments, hyperscalers consolidate ownership, and states prioritize survivability over efficiency in an increasingly contested geopolitical seabed. more

IP Reputation for AI Teams: The Infrastructure Concept Nobody Explains

As AI agents scale, IP reputation emerges as a hidden constraint, shaping access to external systems and degrading performance. Managing network identity, not just models, is becoming essential for reliable data collection. more

Trusted Notifier Network (TNN) Core Concept 2: Building a Chain of Indemnity

TNN proposes a contractual chain of indemnity to shift legal risk in global takedowns, replacing patchy statutory protections with enforceable accountability and a fund that makes good-faith action commercially viable for smaller intermediaries. more

Africa’s Community Networks Offer a Local Path to Inclusive and Resilient Connectivity

Community networks, locally built and governed, are emerging across Africa as cost-effective tools to extend connectivity, bolster digital sovereignty, and improve cyber resilience, despite regulatory, financial, and technical constraints that hinder broader adoption. more

Fake Domains, Real Damage: What the Latest Data Reveals

Third-party domains exploiting brand names are proliferating, with 88% of homoglyphs externally owned. Many remain dormant yet email-enabled, creating scalable phishing risks as attackers increasingly target trust rather than infrastructure. more

Fixing Geofeed: From Self-Reported Data to Verified Trust

Geofeed data, long reliant on unverifiable self-assertions, faces mounting security risks. Integrating RPKI could transform it into a trusted, cryptographically validated infrastructure, strengthening routing integrity, regulatory compliance, and digital sovereignty across an increasingly contested internet. more

The Internet Has a New User - It’s Not You

AI agents are rapidly becoming primary internet users, with inference-driven traffic reshaping network demands and exposing infrastructure blind spots as latency-sensitive, machine-to-machine activity begins to outpace and outcompete human web behavior. more

The Domain Universe in 2026: AI, Security, Market Maturity, and the New gTLD Frontier

Domains enter a mature phase as AI reshapes discovery, security sharpens, and new gTLDs expand. Once simple addresses, they are becoming critical infrastructure for identity, trust, and automated commerce in the evolving web. more

NOGs at a Crossroads: Confronting the New Demands of Network Operations

Surging outages and mounting losses are increasingly forcing a rethink of network operations, as NOGs now confront a shift from technical exchange to strategic governance, where resilience, leadership, and institutional influence define the profession's future. more

The New Space Race for Connectivity: Satellite Internet and Critical Infrastructure

Satellite internet is from backup to core infrastructure, as LEO constellations, non-terrestrial networks and direct-to-device services reshape connectivity, forcing governments and operators to rethink resilience, sovereignty and the architecture of the internet. more

No Safe Harbor: SCOTUS Scuttles the DMCA

America's Supreme Court, in Cox v Sony, recast online copyright liability, effectively sidelining the DMCA safe harbor and replacing it with a narrow inducement standard that leaves service providers little obligation to meaningfully police infringement. more

CaribNOG Enters Its Institutional Era

CaribNOG's 32nd forum in Curaçao marks a shift from volunteer roots to institutional structure, as the Caribbean network community formalises programmes, expands research, and positions itself to tackle climate, geopolitical, and infrastructure pressures. more

The Historical Mandate of the RIR System

The history of the Regional Internet Registry system shows it was designed as a community-governed framework, not a passive ledger, with legitimacy rooted in delegated authority, open policy development, and multistakeholder coordination from its inception. more

Topics

DNS Security

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days