Journeys in hosting 1/x — Precomputed SSH host keys
Guest Post: An investigation into LightNode’s curious use of precomputed SSH host keys — a small operational quirk with security implications.
Guest Post: An investigation into LightNode’s curious use of precomputed SSH host keys — a small operational quirk with security implications.
Eight long held and common beliefs about the network have been shown, time after time, to be false. What are they, and what do they mean?
Guest Post: Why we developed our own API security monitoring system, how it works, and what benefits it delivers.
Guest Post: Insights from 70 data breaches and the creation of CISO Challenge, a simulation that helps leaders see how the right security foundations can make or break a company.
Guest Post: A first global look at how many networks use BGP-based DDoS scrubbing — revealing who’s protected, how adoption has grown, and what it means for Internet resilience.
Guest Post: Cross-disciplinary efforts lead to sharper decisions and stronger outcomes during disruptions.
Guest Post: Investigating transition requirements for PQC DNSSEC.
At APNIC 60, APNIC and FIRST brought together experts from across the region to share real-world responses to cybersecurity threats — from RCE vulnerabilities and lateral movement risks to scalable training models for cyber resilience.
This post shares insights from the APNIC 60 joint session with FIRST about targeted espionage, SEO spam, and academic network vulnerabilities.
Leslie Daigle and Vu The Binh opened APNIC 60 with keynotes: Leslie on tackling bad traffic, and Vu on Viet Nam’s path to IPv6-only and its strategies for IPv6, data centres, and CDNs.