DNS: A look back at a look back
Guest Post: Looking back on past forecasts for the DNS exposes how far it has evolved from its preliminary tasks.
Guest Post: Looking back on past forecasts for the DNS exposes how far it has evolved from its preliminary tasks.
APNIC will soon implement an important change to the aut-num object in the APNIC Whois Database.
Guest Post: NTT Secure Platform Laboratories has discovered five previously unknown evasion techniques by using two types of honeyclients.
Guest Post: Using RPKI ROAs as if they are IRR route(6)-objects is a transitional step towards increased security in the routing ecosystem.
Best practice document assists with configuring routers for connecting to IXes.
Guest Post: The SISSDEN project operates a network of honeypots that detect on average around 10,000 amplification DDoS attacks per day.
Guest Post: There are many common sources for BGP anomalies of which network operators should be aware.
Geoff Huston analyses the current state of BGP security mechanisms based on his observations at the IETF 102 meeting.
Guest Post: Building capacity and cooperation among smaller island economies to address cybersecurity challenges.
Having an ASN enables cable broadband providers to have multiple upstream connections to ensure a diverse path to the Internet.