Guest Post: Study finds that replacing outdated cryptographic algorithms can take more than four years.
Geoff Huston shares his thoughts from IETF 109, including on AS Prepending, Community Networks, DNS centrality, IPv6, and TCP.
Guest Post: Study shows big five content providers are at various stages of DNSSEC, IPv6 and TCP adoption.
Guest Post: HTTPS RRs and STS look similar but there are subtle differences in the threat models and deployment tradeoffs of each.
Guest post: Domain Name System Blocklists have their own specific advantages for inbox protection.
Guest post: The third entry in this series looks at how common packet capture tools can improve output.
Guest post: Part two of this series on packet capture performance examines how open source tools impact packet processing and speed.
Guest Post: Find out which techniques help filter and inspect incoming packets at the right rate.
Guest Post: There’s been a fair amount of progress made in the realm of DoH over the 12 months but equally more work to be done.
Guest Post: GRᴏᴏᴛ is a new open-source static verification tool for DNS zone files.