Building Unitel LLC’s custom API security monitoring system
Guest Post: Why we developed our own API security monitoring system, how it works, and what benefits it delivers.
Guest Post: Why we developed our own API security monitoring system, how it works, and what benefits it delivers.
Guest Post: Insights from 70 data breaches and the creation of CISO Challenge, a simulation that helps leaders see how the right security foundations can make or break a company.
Guest Post: A first global look at how many networks use BGP-based DDoS scrubbing — revealing who’s protected, how adoption has grown, and what it means for Internet resilience.
Guest Post: Cross-disciplinary efforts lead to sharper decisions and stronger outcomes during disruptions.
Guest Post: Investigating transition requirements for PQC DNSSEC.
At APNIC 60, APNIC and FIRST brought together experts from across the region to share real-world responses to cybersecurity threats — from RCE vulnerabilities and lateral movement risks to scalable training models for cyber resilience.
This post shares insights from the APNIC 60 joint session with FIRST about targeted espionage, SEO spam, and academic network vulnerabilities.
Leslie Daigle and Vu The Binh opened APNIC 60 with keynotes: Leslie on tackling bad traffic, and Vu on Viet Nam’s path to IPv6-only and its strategies for IPv6, data centres, and CDNs.
Taiji Kimura’s vision for routing security in the Asia Pacific region is building trust and resilience for the benefit of all.
Adli Wahid explores the APNIC honeypot network and explains how Members can access honeynet traffic data via DASH.