“All Your Base Are Belong To Us!”
At the recent RightsCon 2015 I had the opportunity to work with a few friends from Access to do a Cyber Incident role play.
At the recent RightsCon 2015 I had the opportunity to work with a few friends from Access to do a Cyber Incident role play.
Geoff Huston explores the bigger picture of DDoS attacks and what network operators need to consider.
Tim Nagy from Juniper presented on the virtual router model.
Billions of devices will be connected to the Internet of Things… but will they be secure?
Paul Vixie discusses Source Address Validation Everywhere (SAVE) as an approach to mitigating bad traffic problems.