The drawbacks of blackholing
Guest Post: Study seeks to understand how blackholing is used following DDoS attacks to improve mitigation techniques.
Guest Post: Study seeks to understand how blackholing is used following DDoS attacks to improve mitigation techniques.
Guest Post: Prepending-to-all is a self-inflicted and needless risk that serves little purpose.
Guest Post: Avoiding the use of IP fragmentation in the DNS can assist with reducing the risk of DNS cache poisoning attacks.
The Board of the APNIC Foundation held its second annual meeting in Singapore in May.
Guest Post: Network Operator Group meetings are as much about connecting with your peers as they are the presentations.
Guest Post: It’s important for those wanting to deploy ROAs that they know how to do it and maintain them correctly.
This ‘how to’ explains the process of using Security Onion’s tools to analyse a packet capture, then extract and examine a potentially malicious file.
Sofia Silva Berenguer recently co-organized the Internet Tools BoF at LACNIC 31.
Guest Post: DANE has reached an impasse in web deployment – so where to from here?
Guest Post: With some tweaks to how we approach network security, we can tip the balance back in the favour of defenders.