Software assurance: Approaching allowlisting for code
Guest Post: How does the industry effectively assess software security?
Guest Post: How does the industry effectively assess software security?
Guest Post: A people-centric Internet is where people from all parts of the community including persons with disability can be actively engaged.
Guest Post: ACC-Turbo is an open-source, pulse-wave DDoS defence system that runs at line rate, on programmable switches.
Guest Post: How TLS stack fingerprinting can be done efficiently and provide valuable security-related insights.
Guest Post: Does the development of encrypted DNS help or hinder cybersecurity?
Guest Post: The only practical way to mitigate an attack surface is to control access to it.
Guest Post: Measuring the Log4jShell incident.
Guest Post: A data-driven approach for extracting Finite State Machines from RFCs.
Guest Post: If you have an interesting presentation to share on Internet operations, submit a paper for APRICOT 2023.
Guest Post: Learn how TCP Middlebox Reflection attacks work and what are the best current practices for defending against it.