Recent cases of watering hole attacks: Part 2
Guest Post: Dissecting another recent watering hole and how to defend against them.
Guest Post: Dissecting another recent watering hole and how to defend against them.
Guest Post: Dissecting a recent watering hole and how to defend against them.
Gautam Akiwate discusses his prize-winning paper on risks in the DNS supply chain.
Understanding and managing changes in IoT device behaviour to make network traffic predictions more reliable.
Guest Post: How might a student cheat during a supervised in-person online exam in a BYOD environment?
Deprecating SHA-256, RSA, ECDSA, and ECDH key usage ahead of quantum computing?
Guest Post: An industry-academic analysis on trends in direct-path and reflection-amplification attacks to encourage greater common understanding of the DDoS landscape.
Here are APNIC Blog’s top three posts related to security for 2024.
‘How to’ posts are a great way to learn how to use a new tool, troubleshoot problems, or perform advanced tasks. Here are three of 2024’s best.
In 2024, George Michaelson touched on topics ranging from news to explainers. Here are three of George’s best.