Why don’t we have DNS-security policy for context-full threat protection?
Guest Post: Expecting firewalls and gateways to secure DNS traffic is folly in today’s Internet. Instead, we need a more resilient approach.
Guest Post: Expecting firewalls and gateways to secure DNS traffic is folly in today’s Internet. Instead, we need a more resilient approach.
Guest Post: Canonical Name (CNAME) cloaking is a new measurement technique to circumvent third-party browser extensions.
Guest Post: About 3% of the domain names requested by the NTP pool are invalid, and almost all the invalid domain names have never provided time synchronization services.
How is IPv6 being used as a transport protocol for DNS queries?
Guest post: DNSSEC validation is past 25% worldwide but progress has not been spread evenly. Why?
APNIC participated at the ninth Registration Operations Workshop (ROW #9), held online on 16 June 2020.
Guest Post: Running your own recursive resolver enables you to use the DNS to filter for malicious traffic.
Guest Post: A survey reveals some of the least used functions of DNS resolvers, but does this make them obsolete?
The way DNS resolution is used in today’s network is changing, and it has wider implications.
Stay-at-home measures have had observable impacts on Internet usage, as well as the development of IPv6.