The drawbacks of blackholing
Guest Post: Study seeks to understand how blackholing is used following DDoS attacks to improve mitigation techniques.
Guest Post: Study seeks to understand how blackholing is used following DDoS attacks to improve mitigation techniques.
Guest Post: Prepending-to-all is a self-inflicted and needless risk that serves little purpose.
Guest Post: Avoiding the use of IP fragmentation in the DNS can assist with reducing the risk of DNS cache poisoning attacks.
Guest Post: Network Operator Group meetings are as much about connecting with your peers as they are the presentations.
This ‘how to’ explains the process of using Security Onion’s tools to analyse a packet capture, then extract and examine a potentially malicious file.
Guest Post: With some tweaks to how we approach network security, we can tip the balance back in the favour of defenders.
Guest Post: CARIS2 drew a diverse set of participants to discuss and workshop ideas for scaling and balancing defence and monitoring capabilities.
Last year’s DDoS attacks on Cambodia’s ISPs have been a wake up call to the industry.
Staying out of news headlines should be motivation enough to secure Internet routing. So why do we continue to hear about Internet routing leaks and hijacks?
History has a habit of repeating itself, often for the wrong reasons.