Guest Post: Enterprises are only willing to adopt IPv6 once they see it working, but that can’t happen until they have the necessary expertise. What can be done?
Guest post: Where does DNS spoofing occur? How often? Is it increasing? Researchers examined six years of data to find out.
Guest Post: Mongolia is the second economy in the world to achieve 100% Route Origin Validation (ROV) coverage.
Tashi Phuntsho gave a demo tutorial and presentation at LKNOG 4, held on 22 December 2020.
Guest post: There is a tradeoff between achievable throughput and coverage of wireless signals — using multiple channels can deliver better results.
Guest Post: New tool KADABRA can help monitor Internet resources growth, check for incidents, and analyze RPKI data for Indonesia.
Guest Post: Most WiFi devices are designed to acknowledge all packets received — this poses security risks.
Geoff Huston reports on IPv4 and IPv6 addressing in 2020 and makes some predictions for the future.
Adli Wahid discussed the role of CSIRTs and ISACS in cyber-resilience at a recent CSIRT.ID virtual seminar.
Guest Post: How do cloud networks affect the services that RIRs provide?