As Africa digitises rapidly, control over data is emerging as a strategic contest. Foreign infrastructure dominance exposes economic and cybersecurity vulnerabilities, pushing governments to prioritise digital capability, regional cooperation, and stronger sovereignty over the systems powering the continent's future. more
Fake recruitment websites exploiting India's young job seekers are proliferating, exposing millions to identity theft, financial fraud and malware while regulators, registrars and digital literacy programs struggle to keep pace with a growing labor market. more
Unicorn firms lead in DNS-based security adoption, signaling technical maturity, while Global 2000 rely on enterprise registrars. Gaps in redundancy and brand protection expose supply chain risks as cyberattacks intensify across industries globally today. more
Third-party domains exploiting brand names are proliferating, with 88% of homoglyphs externally owned. Many remain dormant yet email-enabled, creating scalable phishing risks as attackers increasingly target trust rather than infrastructure. more
Satellite internet is from backup to core infrastructure, as LEO constellations, non-terrestrial networks and direct-to-device services reshape connectivity, forcing governments and operators to rethink resilience, sovereignty and the architecture of the internet. more
Geofeed data, long reliant on unverifiable self-assertions, faces mounting security risks. Integrating RPKI could transform it into a trusted, cryptographically validated infrastructure, strengthening routing integrity, regulatory compliance, and digital sovereignty across an increasingly contested internet. more
The history of the Regional Internet Registry system shows it was designed as a community-governed framework, not a passive ledger, with legitimacy rooted in delegated authority, open policy development, and multistakeholder coordination from its inception. more
Iran-linked hackers infiltrated US industrial control systems, disrupting energy and water infrastructure. The attacks highlight systemic vulnerabilities in internet-connected devices and signal an enduring cyber threat despite easing geopolitical tensions. more
A dispute over African IP governance exposes a flaw in the RIR system, where thin policy, weak accountability and institutional self preservation risk overriding running networks and undermining the technical legitimacy that sustained global coordination. more
Fifteen years after IPv4 exhaustion, a transfer market has reallocated scarce address space, enabling internet growth, despite uneven registry policies, opaque fees, and lingering resistance to a system that proved more pragmatic than planned reclamation. more
At ICANN85, reflection on WSIS+20 highlights a quieter milestone: youth successfully secured recognition as a distinct stakeholder group, reshaping how Internet governance defines participation and offering a blueprint for other overlooked communities seeking voice today. more
Low Earth orbit is crowding as Starlink, Amazon, China and others race to deploy thousands of satellites, promising faster broadband while intensifying global competition, orbital congestion concerns and a push for direct-to-device connectivity. more
GlobalBlock's expansion into China and Germany signals a shift from reactive brand protection to centralized prevention, as firms seek scalable, cost efficient defences against proliferating AI driven domain abuse worldwide amid a fragmented digital landscape. more
ICANN's new DNS abuse rules mark progress, yet short-term domain leasing enables fleeting, hard-to-detect attacks. A proposed 30-day minimum lease could curb cybercrime by undermining the economics of weaponised parked domains. more
IPv4 scarcity turned regional internet registries from clerks into gatekeepers of a valuable resource. Yet liability caps remain trivial, leaving powerful institutions with little accountability and incentives for conflict and structural breakdown ahead. more