The IPv4 address swamp: The new normal
Guest Post: Has IPv4 allocation improved in the 21st century, or are prefixes becoming smaller and more fragmented? What are the potential impacts on Internet security?
Guest Post: Has IPv4 allocation improved in the 21st century, or are prefixes becoming smaller and more fragmented? What are the potential impacts on Internet security?
A closer look at which training was offered and where gives an interesting picture of the technical skills development priorities in the Asia Pacific region.
Guest Post: An investigation into LightNode’s curious use of precomputed SSH host keys — a small operational quirk with security implications.
Eight long held and common beliefs about the network have been shown, time after time, to be false. What are they, and what do they mean?
Guest Post: Why we developed our own API security monitoring system, how it works, and what benefits it delivers.
Guest Post: Insights from 70 data breaches and the creation of CISO Challenge, a simulation that helps leaders see how the right security foundations can make or break a company.
Guest Post: A first global look at how many networks use BGP-based DDoS scrubbing — revealing who’s protected, how adoption has grown, and what it means for Internet resilience.
Guest Post: Cross-disciplinary efforts lead to sharper decisions and stronger outcomes during disruptions.
Guest Post: Investigating transition requirements for PQC DNSSEC.
At APNIC 60, APNIC and FIRST brought together experts from across the region to share real-world responses to cybersecurity threats — from RCE vulnerabilities and lateral movement risks to scalable training models for cyber resilience.