Guest Post: New Network Time Protocol client secures against time shifting by man-in-the-middle attackers.
Guest Post: Have you ever considered when you use Google DNS as your resolver, whether your queries may be answered by somebody else?
Guest Post: Study seeks to understand how blackholing is used following DDoS attacks to improve mitigation techniques.
Guest Post: Prepending-to-all is a self-inflicted and needless risk that serves little purpose.
Guest Post: Avoiding the use of IP fragmentation in the DNS can assist with reducing the risk of DNS cache poisoning attacks.
Guest Post: Network Operator Group meetings are as much about connecting with your peers as they are the presentations.
This ‘how to’ explains the process of using Security Onion’s tools to analyse a packet capture, then extract and examine a potentially malicious file.
Guest Post: With some tweaks to how we approach network security, we can tip the balance back in the favour of defenders.
Guest Post: CARIS2 drew a diverse set of participants to discuss and workshop ideas for scaling and balancing defence and monitoring capabilities.
Last year’s DDoS attacks on Cambodia’s ISPs have been a wake up call to the industry.