Recent cases of watering hole attacks: Part 2
Guest Post: Dissecting another recent watering hole and how to defend against them.
Guest Post: Dissecting another recent watering hole and how to defend against them.
Guest Post: Dissecting a recent watering hole and how to defend against them.
Guest Post: Exploring the characteristics of various traffic models using synthetic data to gain insight into traffic patterns.
Guest Post: Tracing the growth of an IXP from a local hub to exceeding one terabit of Internet traffic.
Guest Post: RPKI has become the number one tool in the toolbox to prevent routing incidents.
Guest Post: The importance of the Community Networks Exchange and Digital Citizen Summit events as catalysts for community networks.
Guest Post: Investigating the risks of DNS scanning for the DNS infrastructure.
Gautam Akiwate discusses his prize-winning paper on risks in the DNS supply chain.
Close to 300 responses were received from diverse Internet communities in the feedback period for the proposed ICP-2 principles.
An improved strategy to advocate for DNSSEC and RPKI deployment.