Wireshark’s little known Snort post-dissector
Guest Post: Did you know you can use Wireshark to find which specific packet triggered a Snort rule within a few seconds?
Guest Post: Did you know you can use Wireshark to find which specific packet triggered a Snort rule within a few seconds?
This face-to-face APNIC Academy workshop in Singapore will examine best practices to protect data and assets from potential attacks or abuse.
Guest Post: How to mitigate an attack that can bypass security features of shared CDNs.
Guest Post: 80% of DDoS attacks can be reduced by patching 20% of open DNS resolvers.
Guest Post: IPSec has had issues; is it ready to be deployed to a large-scale multi-vendor network?
Guest Post: New system makes observed traffic metadata independent of the real traffic in Wide Area Networks.
Guest Post: How to traverse Carrier-Grade NAT.
Guest Post: New method observes DDoS intensity by measuring infrastructure involved in attacks using IXPs.
Guest Post: Study shows that most consumer IoT devices rely on TLS 1.2; few have upgraded to TLS 1.3.
Guest Post: Is 100% NAT traversal success rate achievable?