Zeros are heroes: NSEC3 parameter settings in the wild
Guest Post: Do authoritative nameservers and resolvers follow best practices for NSEC3 settings?
Guest Post: Do authoritative nameservers and resolvers follow best practices for NSEC3 settings?
Using Moore’s Law, a computer 20 years into the future is predicted to be around 10,000 times more capable than today’s computation capabilities. Geoff Huston explores some practical implications.
Jamie Gillespie presented at BtCIRT National Cybersecurity Conference 2024, held in Thimphu, Bhutan on 25 October 2024.
Guest Post: Fresh insights into the growing threat of high packet rate attacks.
Guest Post: Researchers investigate the methods and frequency with which attackers target poorly secured cloud storage buckets.
Guest Post: Profiling serial hijackers with less data than previous efforts while achieving similar accuracy.
Adli Wahid conducted hands-on training at the Brunei CySec Conference 2024, held in Bandar Seri Begawan, Brunei Darussalam from 18 to 19 September 2024.
Guest Post: Auditing prominent mail providers to discover how they handle email encryption and show how MTA-STS can help improve email security.
Guest Post: Lessons learned from a study on the interrelation of CAA, CT, and DANE in web PKI deployments.
Guest Post: Is RPKI stable enough to meet the recent White House roadmap expectations?