Software assurance: Approaching allowlisting for code
Guest Post: How does the industry effectively assess software security?
Guest Post: How does the industry effectively assess software security?
Guest Post: The vulnerabilities that led to the discovery of browser-powered desync attacks.
Adli Wahid provided communication best practices during a cybersecurity incident at PaCSON 2022, held from 26 to 29 September 2022 in Suva, Fiji.
People are talking about the Internet and climate change — hot air or substantial conversations?
The Quantum Internet is no longer a thing of tomorrow but is ready to make an impact now.
KINDNS, DNSSEC deployment risks, fourteen years in the life of A-Root, DNS at the IETF, and more from DNS-OARC 39.
Guest Post: A people-centric Internet is where people from all parts of the community including persons with disability can be actively engaged.
Guest Post: ACC-Turbo is an open-source, pulse-wave DDoS defence system that runs at line rate, on programmable switches.
Orbit is an evolution of mailing lists with added social networking features.
Guest Post: How TLS stack fingerprinting can be done efficiently and provide valuable security-related insights.