The World Summit on Information Society (WSIS) convened by World leaders in 2003 and 2005 following the realization of the crucial roles of Information and Communications Technologies (ICTs) (also known in the industry as the Internet) played in economic growth and development. Since 2005, ICTs have added more than $10tr to the global economy (Oxford Economics, 2020). more
Afnic, the .FR Top Level Domain registry published its annual report that details the activity of .FR over the past year. Analyses of the specificities of the French Internet domain and domain market trends in France in 2024. more
When major events like the Super Bowl are on the horizon, cybercriminals exploit public trust by creating fraudulent domains for fake betting sites, phishing, and malware distribution. CSC's research into top online sportsbooks highlights the hidden risks of dormant domains, which, though inactive, can quickly be repurposed for cyber attacks. Overlooked yet dangerous, these domains play a key role in impersonation, misinformation, and scams targeting event-driven traffic, underscoring the need for continuous monitoring of lookalike, dropped, re-registered, and newly registered domains. more
Last month marked 40 years since the registration of the world's first ever .com domain name – symbolics.com – in March 1985. It’s a time to reflect both on the role .com has played in the evolution and growth of the internet over the past 40 years, and on the importance of ensuring that .com remains secure, stable, and resilient for the billions of people who rely on it every day. Who could have imagined in 1985 that over the course of the next four decades, internet users would register hundreds of millions of domain names... more
CTIA, the trade association for cellular companies, published a recent blog titled, "The Looming Spectrum Crisis". The blog quotes a study from Accenture that concludes that a lack of spectrum for 5G is reaching a point of crisis. The Accenture study says that cellular networks will be unable to meet nearly one-fourth of peak-period requests for connection as soon as 2027. more
One major element of many brand-protection programmes is the use of an algorithm to sort the findings identified through monitoring, according to their relevance or level of potential threat. This prioritisation process offers a number of benefits, including the identification of priority targets for further analysis, content tracking, or enforcement. more
Artificial intelligence (AI) has become synonymous with innovation, transforming industries at an unprecedented pace. While some may frame AI as a groundbreaking development of our time, it's essential to acknowledge that its roots run deep. AI has evolved immensely from early tools like the abacus to present-day GPU-driven large language models. What sets the current landscape apart? The sheer scale of data, computational demand, and complexity of workloads. more
The marketing area of the broadband industry spends a lot of time convincing folks that the most important part of a broadband product is download speed. This makes sense if fiber and cable are competing in a market against slower technologies. But it seems like most advertising about speed is to convince existing customers to upgrade to faster speeds. While download speed is performance, the industry doesn't spend much time talking about the other important attributes of broadband. more
The Colombian's Ministry of ICT (MinTIC), and ccTLD Manager for the .CO ccTLD, recently announced an expedited timeline for the Request for Proposal (RFP) to operate over 3 million .CO domains for the next 10 years. The proposed 10-year term is double the current five-year term. This represents the latest in a series of recent RFPs associated with several high-profile TLDs before ICANN's planned roll-out of new gTLD early next year. more
On Jan. 11, 2025, Verisign supported the Internet Corporation for Assigned Names and Numbers (ICANN) in taking a major step to ensure the continued security, stability, and resiliency of the Domain Name System (DNS). While imperceptible to most users, this action - specifically, the introduction of a new Domain Name System Security Extensions (DNSSEC) Key Signing Key (KSK) in the root zone - is the next step of a multi-year-long process to change, or "roll," the cryptographic key that secures the root of the DNS. more
Experts at a CircleID and Edgemoor Research Institute webinar debated the challenges of domain registration data access in a post-GDPR world. Panelists explored the tension between privacy laws and legitimate data requests, the role of automation in disclosure decisions, and the need for a scalable, trust-based framework to balance compliance, cybersecurity, and enforcement interests. more
At 4:04 am on February 26 Mykhailo Fedorov, Vice Prime Minister and Minister of Digital Transformation of Ukraine, requested Starlink service from Elon Musk, and at 2:45 pm on the 26th, Elon Musk tweeted "Starlink service is now active in Ukraine. More terminals en route." On February 28 at 12:29 pm, Fedorov posted a photo of a truckload of terminals. (Kyiv is 10 hours ahead of California) and an engineer, Oleg Kutkov, posted the first tweet from Ukraine. more
Governments across Africa increasingly wield internet blackouts as a tool to suppress dissent, with 2024 marking a record high for digital censorship. According to a report by Access Now and #KeepItOn, 21 internet shutdowns were recorded across 15 African nations, surpassing previous highs in 2020 and 2021. more
Elon Musk has attributed a series of major disruptions on X, the social media platform he owns, to a large-scale cyberattack. The outages, which persisted for several hours today (and are still ongoing), left users unable to access the service, triggering a flurry of speculation. more
There was one unpleasant message from the 2025 Munich Security Conference (MSC), which will have probably far reaching consequences for the governance of the digital space: Cyberspace will be governed by the rules of geo-political conflicts. And it is a battlefield in the 21st century wars. Both in the "Bayerischer Hof" and in the "IHK Munich", where the 11th edition of the Munich Cybersecurity Conference (MCSC) took place, controversial debates circled around the question of how civilian and military use of digital services will interplay in the years to come. more