Identifying malicious IoT botnet activity using graph theory
Beating IoT botnets means spotting them first — graph theory research can help.
Beating IoT botnets means spotting them first — graph theory research can help.
Virtual meetings in the intergovernmental space may become the ‘new normal’ in these unusual times.
On the third week of May 2020, APNIC welcomed its 8,000th direct Member.
Guest Post: Automation should not necessarily be seen as competition for network engineers but another tool in their toolbox.
The 2020 APNIC Survey is now open.
Guest Post: Help researchers understand how well and secure email servers are setup.
Guest post: DNSSEC validation is past 25% worldwide but progress has not been spread evenly. Why?
Peek behind the scenes of APNIC’s Honeynet project to see what open source tools are being used.
Guest Post: HTTPS adds an encrypted layer of protection, applying TLS to your browser’s communications with the website, which hides the information being sent back and forth, ensuring prying eyes cannot see the information.
APNIC participated at the ninth Registration Operations Workshop (ROW #9), held online on 16 June 2020.