DoH the right thing
Opinion: The NSA recently issued some advice on DoH. It wasn’t necessarily bad advice, but it was not well received.
Opinion: The NSA recently issued some advice on DoH. It wasn’t necessarily bad advice, but it was not well received.
The recent RIPE NCC Open House discussion on RPKI highlighted global progress and challenges still to solve.
Guest post: Where does DNS spoofing occur? How often? Is it increasing? Researchers examined six years of data to find out.
Guest Post: Mongolia is the second economy in the world to achieve 100% Route Origin Validation (ROV) coverage.
Guest Post: Most WiFi devices are designed to acknowledge all packets received — this poses security risks.
Adli Wahid discussed the role of CSIRTs and ISACS in cyber-resilience at a recent CSIRT.ID virtual seminar.
APNIC’s Adli Wahid presented on CERT cooperation and engagement at the CNCERT International Partnership in Emergency Response Conference.
Guest post: A new tool that uses DNS cache snooping on public DNS resolvers to measure the prevalence of rare applications and domains on the Internet.
2020 was a challenging year for cybersecurity professionals, with a transformed threat landscape.
APNIC presented on securing Internet routing at BSides Brisbane in Brisbane, Australia on 12 December 2020.