Disruption beats listing: Why domain takedowns and enforcement stop cybercrime at the source
Phishing and domain-enabled fraud are not “edge cases” in today’s threat landscape - they are a primary entry point. reports that phishing remains the dominant initial intrusion vector in Europe, accounting for 60% of cases in the reporting period covered by the ENISA Threat Landscape 2025. Against that backdrop, most organisations still rely heavily on passive controls: email filtering, URL reputation checks, and third‑party abuse lists. These controls matter - but they do not end the threat. They flag malicious infrastructure; they do not remove it.
Anonymous Domain Registration Is Fuelling Cybercrime - And the Industry Knows It
Phishing, fraud, malware, and brand impersonation do not scale because attackers are especially clever - they scale because the internet makes it cheap and anonymous to stand up new infrastructure. At the centre of that problem sits domain registration. If domains can be registered globally with minimal identity verification, cybercrime will continue to industrialize faster than defenders can respond. This article examines why anonymous registration has become one of the internet’s most powerful abuse enablers - and what would change if registrars worldwide treated identity verification as a security control, not a formality.
Jurisdiction Matters: Why EU Organisations Should Choose European Domain Registrars
Public sector IT leaders, legal officers, and enterprise decision-makers often face a critical question: does it matter where your domain name registrar is based? In an era of strict data protection laws and rising digital sovereignty concerns, the answer is a resounding yes. Choosing a domain registrar located in the European Union (EU) versus one outside (for example, a US-based provider) can have far-reaching implications for legal compliance, data security, and public trust. This article delves into why EU public entities and enterprises should opt for an EU-based registrar - highlighting the legal risks of foreign jurisdictions and the tangible benefits of keeping your domains under EU oversight.
The new cybersecurity law – what the public sector needs to know
On 15 January 2026, Sweden's new Cyber Security Act (SFS 2025:1506) will come into force. The Act aims to achieve a high level of cyber security in society and implements the EU's NIS 2 Directive into Swedish law. This means that many organisations will face stricter requirements to improve their protection against cyber threats. The government has emphasised that municipalities and other organisations also need to ‘step up their game’ in their cybersecurity work – the new law will tighten the requirements for these actors. In this article, I summarise the purpose of the law, which public sector organisations are affected, the key obligations (particularly regarding security measures, incident reporting and training) and provide practical guidance ahead of its entry into force.
Why a Robust and Resilient Recursive DNS Is Critical for 100% Uptime
In today’s hyper-connected digital world, every millisecond matters - and so does every moment of downtime. While enterprises invest heavily in application availability, failover systems, and global content delivery, one crucial piece of infrastructure is often overlooked: Recursive DNS (Domain Name System). If your recursive DNS is not robust and resilient, your entire online presence is at risk - even if your servers are flawless. Here is why your business should prioritize a high-availability DNS strategy.
Why Anycast DNS should be part of your NIS2 implementation plan
Anycast DNS provides the online resilience required by the NIS2 Directive. It ensures online resources and services are always available even when attacks do happen by providing multiple routing options that make it possible to filter out malicious traffic.
Corporate Address
Jan Stenbecks torg 17
164 40 KISTA
SWEDEN
