Forgotten protocol chronicles: Do not underestimate the installed base
Guest Post: The stubborn persistence of legacy technologies.
Guest Post: The stubborn persistence of legacy technologies.
Guest Post: Applying physical early warning system frameworks to cyber hazards.
Guest Post: Real-life hijacks of cloud resources identified for the first time.
Geoff Huston discusses the EU taking a direct role in the IETF standards development process.
Guest Post: New botnet uses the Binance Smart Chain to host command and control servers and infect shell scripts like a virus to achieve persistence.
Current and competing work items in DNS at the IETF.
Guest Post: Cloud native architecture is a game changer for security at scale. How long before we see automation through attestation, built-in at scale?
An intriguing detective story about debugging a chain of problems.
Guest Post: Delay Tolerant Networking over heterogeneous Internetworks must be engineered to achieve peak performance. What can be done?
DNS-OARC’s president, Phil Regnauld, discusses the three faces of DNS-OARC — the community, tools, and DITL collection.