/ Most Commented

Converging Technologies Create New Cyber Threats, UK Government Warns

As digital technologies intertwine ever more closely, new vulnerabilities are surfacing in unexpected places. A recent UK government report highlights how the convergence of emerging technologies - such as artificial intelligence (AI), blockchain, quantum computing, and the Internet of Things (IoT) - is generating complex cybersecurity risks across critical sectors. more

Why Businesses Aren’t Hanging Up Landlines Yet

There was a recent article in the Wall Street Journal that noted that the business world still uses a lot of landline telephones. Landline telephones have been steadily disappearing from homes, but are still not gone. I see ISPs still selling a telephone line to 10% or more of passings, and surveys show that the average residential landline penetration rate is still somewhere between 15% and 20%. more

Learning from History: The Potsdam Call on Autonomous Weapon Systems

Eighty years ago, in August 1945, the world saw hope and horror. On August 1, 1945, just weeks after the adoption of the UN Charter, the leaders of the United States, the United Kingdom and the Soviet Union signed the Potsdam Agreement, which produced hope for a peaceful post-war world. Only some days later, the world saw the horror of nuclear bombs in Hiroshima and Nagasaki. A cold war followed. more

AI in Academia: Tool or Trap? Balancing Innovation and Intellectual Honesty in the Digital Age

AI has revolutionized how we process information, optimize tasks, and conduct research. However, its integration into academia sparks ethical and practical debates. Should we limit its use? How can we assess a student's true knowledge if they employ these tools? This text explores these questions from the perspective of a technology expert who argues that banning AI is as absurd as rejecting calculators or spreadsheets in the past. more

The Latest DNS Threat Landscape: Why CISOs Must Rethink Blocking Strategies

Cybercriminals live by the tenet "If it ain't broke, don't fix it." They'll use the same tactics repeatedly until they no longer work, then switch things up. That's why CISOs and their security teams maintain constant vigilance. Underscoring this, recent analysis of global DNS activity found that new domains continue to be a major tactic for bad actors. more

The IPv6 Divide: How Slow Adoption Creates Digital Vulnerabilities and Economic Inequality

The shift to IPv6 has escalated into a matter of national security, as nations lagging in adoption are increasingly exposed to cyber threats and diminished control over their digital infrastructure due to the limited availability of IPv4. With IPv6-only environments becoming more common, reliance on IPv4 may lead to slower connectivity, deepening the digital divide and potentially worsening economic disparities. In this geopolitical landscape, moving to IPv6 serves as a critical step toward maintaining digital independence. more

WSIS+20 and the Youth Dilemma: Rethinking Participation in Global Internet Governance

On Wednesday, 9 July, I attended the WSIS+20 HLE Overall Review multistakeholder consultation with co-facilitators H.E. Mr Ekitela Locale from the Republic of Kenya, and H.E. Ms Suela Janina from the Republic of Albania with my UNU-CRIS hat and had the opportunity to talk with them together with my fellow youth IGF colleagues Dana Cramer and Jasmine Ko. We discussed youth participation in Internet governance, and I raised my concerns about the future of youth IGFs. more

Mauritius Steps In: Unraveling the AFRINIC Crisis and Its Impact on African Internet Governance

A Supreme Court judge in Mauritius has been appointed to investigate AFRINIC, Africa's IP address registry, following allegations of misconduct, legal irregularities, and criminal falsification. The inquiry marks a pivotal moment in African internet governance, with implications for regional digital infrastructure and the continent's credibility in managing critical online resources. more

The Commonest Domain Features: Constructing Look-Up Tables for Use as Part of a Domain Risk Scoring System

Many previous pieces of research have focused on the desirability of a comprehensive scoring system, to be used for ranking results identified as part of a brand-protection solution, according to their potential level of threat. Such scoring systems offer the capability for identifying prioritised targets for further analysis, content tracking or enforcement actions. more

ICANN Warns of Governance Crisis at AFRINIC Amid Allegations and Legal Challenges

The Internet Corporation for Assigned Names and Numbers (ICANN) has issued a stern open letter to the Government of Mauritius and the court-appointed receiver of AFRINIC, the Regional Internet Registry (RIR) for Africa and the Indian Ocean. The letter, dated July 16th, expresses grave concern over AFRINIC’s governance failures, opaque election practices, and recent attempts by a controversial resource member to dissolve the organization. more

AFRINIC’s Election Crisis Exposes Why RIR Oversight Must Evolve

What might look like a routine procedural dispute over votes is, in fact, a glaring reminder that Regional Internet Registries (RIRs) are now geopolitical pressure points - and that ICANN's oversight of RIR governance must evolve to meet these risks. On 23 June 2025, AFRINIC, the RIR that serves Africa, attempted to hold long-delayed elections to restore stability after years of legal battles and board paralysis. Yet instead of restoring trust, the process imploded almost immediately. more

Disconnecting Finance: The EU’s Risky Use of Domain Takedowns as Regulatory Weapon

The European Union is increasingly wielding domain name deletions as a tool of financial enforcement - a trend sparked by the Markets in Crypto-Assets Regulation (MiCA) and now spreading across other legislative efforts such as the Financial Data Access Framework (FiDA) and the Payment Services Regulation (PSR).  more

Cloud-Edge Collaboration: The Inevitable Future of AI Computing

Over the past decade, cloud computing has experienced explosive growth, evolving from its nascent stage to widespread adoption and fundamentally changing how businesses and individuals use information technology. At the same time, traditional on-premise computing, while still having its use cases, has been progressively integrated with, and often even controlled by, Cloud Service Providers (CSPs) in many aspects. more

Breaking Ground: Historic Launch of UN Global Mechanism for Cyberspace Governance

The international community has long struggled with the challenge of translating international law into actionable norms and practices in cyberspace. The conclusion of the United Nations Open-Ended Working Group (OEWG) on the security of and in the use of information and communications technologies 2021-2025 marks a vital milestone in that ongoing process.  more

Global Domain Name Market Reaches 372 Million Domains, 1.5% Growth in 2024

Afnic, the French association in charge of the .fr domain and several other Internet Top Level Domains, has published the 2024 edition of its annual analysis "The Global Domain Name Market". Here is a summary of the overarching trends and key figures. more