Guest Post: IXPs have had a clear impact in reducing paths and dependence on Tier-1 transit providers.
Guest Post: New Network Time Protocol client secures against time shifting by man-in-the-middle attackers.
Guest Post: Have you ever considered when you use Google DNS as your resolver, whether your queries may be answered by somebody else?
Guest Post: Study seeks to understand how blackholing is used following DDoS attacks to improve mitigation techniques.
Guest Post: Prepending-to-all is a self-inflicted and needless risk that serves little purpose.
Guest Post: Avoiding the use of IP fragmentation in the DNS can assist with reducing the risk of DNS cache poisoning attacks.
Guest Post: It’s important for those wanting to deploy ROAs that they know how to do it and maintain them correctly.
This ‘how to’ explains the process of using Security Onion’s tools to analyse a packet capture, then extract and examine a potentially malicious file.
Guest Post: DANE has reached an impasse in web deployment – so where to from here?
Guest Post: With some tweaks to how we approach network security, we can tip the balance back in the favour of defenders.