Remote attestation enabling posture assessment for automated GRC
Guest Post: Attestation performed across the full hardware and software stack can be used to provide system level posture assessment.
Guest Post: Attestation performed across the full hardware and software stack can be used to provide system level posture assessment.
How many pieces of a treasure map need to be shared so one person alone can’t get the treasure?
Guest Post: Should cybersecurity teams recommend solutions or just break down the problem?
Guest Post: A framework that overcomes the problem in IP-to-AS mapping.
Guest Post: Capturing DDoS characteristics with the Dissector.
Guest Post: How can we simplify trusted assurance?
The discovery of bad code deliberately inserted into the Linux kernel shows the value of an active community.
Guest Post: Analysis of a new type of botnet.
Spoofed packets allow senders to hide their source address. How do they work and why do they do it?
Fixing your incorrect or outdated ROAs is easy — here’s how.