CERT Tonga mitigates risk with awareness
Tonga’s multi-level approach to cybersecurity sets a great example in the region.
Tonga’s multi-level approach to cybersecurity sets a great example in the region.
Presentations on router history and routing security caught Geoff’s eye at NANOG 81.
Guest Post: Roughly half of all ASes fail to filter for spoofed traffic as it enters their network border. A new tool helps admins test their own network in real time.
There are plenty of alternatives for RPKI validation.
Guest Post: An investigation into an HTTPS interception attack using a custom root CA.
Adli Wahid attended IBCAST 2021 where he delivered a presentation on the APNIC Community Honeynet project.
Opinion: The NSA recently issued some advice on DoH. It wasn’t necessarily bad advice, but it was not well received.
The recent RIPE NCC Open House discussion on RPKI highlighted global progress and challenges still to solve.
Guest post: Where does DNS spoofing occur? How often? Is it increasing? Researchers examined six years of data to find out.
Guest Post: Mongolia is the second economy in the world to achieve 100% Route Origin Validation (ROV) coverage.