Where does zero trust begin and why is it important?
Guest Post: As zero trust becomes more pervasive, how do we maintain an assurance of its effectiveness?
Guest Post: As zero trust becomes more pervasive, how do we maintain an assurance of its effectiveness?
APNIC has a tool which looks at malicious traffic. So let’s take a deep dive!
Guest Post: Exploring common knowledge gaps in RPKI and how to address them.
Guest Post: Internet security trends and how they will affect the future.
Adli Wahid presented on the APNIC Honeypot project and DASH at the FIRST 1st Regional Virtual Lightning Talk Session, held online on 25 February 2021.
Tonga’s multi-level approach to cybersecurity sets a great example in the region.
Presentations on router history and routing security caught Geoff’s eye at NANOG 81.
Guest Post: Roughly half of all ASes fail to filter for spoofed traffic as it enters their network border. A new tool helps admins test their own network in real time.
There are plenty of alternatives for RPKI validation.
Guest Post: An investigation into an HTTPS interception attack using a custom root CA.