Security by diversity: The business of security through diversity
How to work with quality uncertainty and scaling different forms of security.
How to work with quality uncertainty and scaling different forms of security.
What advice does the NSA have for operating dual-stack and new IPv6 networks?
Guest Post: Where were you when SQL Slammer nearly broke the Internet? Could it happen again?
Guest Post: How cloud networks can be misused to carry out DNS-based reflection DDoS attacks.
Guest Post: How TTL really works and how it can actually be used to increase network security.
Guest Post: Addressing DNS encryption’s vulnerabilities and practical challenges.
Guest Post: How to enumerate subdomains in a DNSSEC-enabled zone.
Guest Post: Researchers propose new approach for addressing the availability demands of critical low-volume applications.
Adli Wahid presented on ‘Observations from the APNIC Honeynet Project’ for the CNCERT International Partnership Conference 2022, held on 14 December 2022.
Guest Post: How to improve subdomain enumeration by including an often-ignored DNS node.