Credential stuffing and SIM swaps
As stolen credentials increase, what are the best current practices?
As stolen credentials increase, what are the best current practices?
Leslie Daigle discusses Global Cyber Alliance’s honeynet project, DNS, and MANRS.
Discussing the implications of a change to IETF normative language.
APNIC’s PING podcast continued to attract experts to discuss varied Internet operation topics — here are three of the best.
How Darwin’s Theory of Evolution might apply to networking.
Is it time to abandon the OSI seven-layer model?
How ICANN manages data capture from the IMRS (L Root) systems worldwide.
Much more than a registry — NOGs, IXPs and CERTs.
Does the future of data centres lie beneath the waves?
Geoff Huston discusses LEO satellites and TCP congestion control.