Threat hunting 101: Hunting with Yara rules
Guest Post: Yara rules are an easy yet important threat hunting tool for searching for malicious files in your directories.
Guest Post: Yara rules are an easy yet important threat hunting tool for searching for malicious files in your directories.
We must anticipate changes in computational capacity when choosing an encryption algorithm, but is it relevant to DNSSEC?
Asia Pacific organizations are getting better and more proactive at detecting compromises in their own network.
Guest Post: RPKI updates need to work their way through certificate chains to a handful of ASes. What if they were more spread out?
Guest Post: After issues at recent DNSSEC KSK ceremonies what can we expect at the next one?
Guest Post: Study shows clients can distribute DNS queries across a set of popular recursive resolvers without performance degradation.
Sanjaya participated as a panellist at the IDNIC Special Meeting/APJII National Meeting 2021, held online from 26 to 29 September 2021.
Guest Post: If you have an interesting presentation to share on Internet operations, submit a paper for APRICOT 2022.
Guest Post: What happens at a Root KSK ceremony? What’s at stake, and what could go wrong?
Guest Post: Eleven-year study characterizes the rise of heavy hitters and big-fast TCP flows.