Why don’t we have DNS-security policy for context-full threat protection?
Guest Post: Expecting firewalls and gateways to secure DNS traffic is folly in today’s Internet. Instead, we need a more resilient approach.
Guest Post: Expecting firewalls and gateways to secure DNS traffic is folly in today’s Internet. Instead, we need a more resilient approach.
Guest Post: What does a ‘secure’ IPv6 stack look like/incorporate?
APNIC now has a formal process for security researchers to notify us of any bugs or weaknesses.
Guest Post: Website admins have a role to play to make sure HTTPS is deployed everywhere across the web.
Guest Post: BGPalerter is an open source and self-contained tool that can be used for BGP monitoring.
Guest Post: About 3% of the domain names requested by the NTP pool are invalid, and almost all the invalid domain names have never provided time synchronization services.
Adli Wahid participated at the IX 2020 – Internet Security and Mitigation of Risk Webinar, held online on 15 June 2020.
Guest Post: Help researchers understand how well and secure email servers are setup.
Peek behind the scenes of APNIC’s Honeynet project to see what open source tools are being used.
Guest Post: HTTPS adds an encrypted layer of protection, applying TLS to your browser’s communications with the website, which hides the information being sent back and forth, ensuring prying eyes cannot see the information.