CERTainty in response to cyberattacks
Computer Emergency Response Teams use a range of techniques to secure partners.
Computer Emergency Response Teams use a range of techniques to secure partners.
Adli Wahid presented on the APNIC Honeynet Project at Threat Con 2021, held online from 8 to 11 September 2021.
Guest Post: Shell tools for MRT dumps and where to find them.
Guest Post: To combat cyber threats to organizations of all sizes, we need to rethink how information security is delivered and managed.
APNIC reported the findings of the review during the APNIC Members Meeting.
Geoff shares his thoughts on what was being discussed the recent OARConline 35a.
Guest Post: New research aims to apply Machine Learning to Internet and DNS security, responsibly.
RFC 9102: Trust versus credulity.
Guest Post: Alternative models to zone transfer that can support DNSSEC’s non-standardized features.
APNIC Senior Security Specialist Adli Wahid describes threats the APNIC Honeynet project has observed and how to mitigate them.