Ignore misconfigurations at your peril
Guest Post: It’s easy to focus on critical security issues but ignore misconfigurations that could become attack vectors.
Guest Post: It’s easy to focus on critical security issues but ignore misconfigurations that could become attack vectors.
Guest Post: Traffic going through a public DNS in Taiwan was rerouted to an entity in Brazil for about three and a half minutes.
Register now for our four-day Network Security with Packet Analysis workshop at btNOG 6, from 4 to 7 June 2019 in Paro, Bhutan.
Geoff Huston shares his thoughts from DNS-OARC 30.
Guest Post: Machine learning can assist with overcoming some of the shortcomings of manual anomaly detection processes.
The recent ICANN DNS Symposium in Bangkok was almost exclusively devoted to the namespace associated with the DNS resolution protocol.
APNIC will deliver a five-day Information Security workshop from 3 to 7 June 2019, in Port Vila, Vanuatu.
Guest Post: Even the best cybersecurity strategy can overlook the simplest weaknesses.
Guest Post: No matter how hard we try, IoT devices will always have some vulnerability. But that doesn’t mean we are defenceless.
Adli Wahid gave an overview of APNIC’s cybersecurity activities in the Pacific at the Cyber Security Regional Forum in Sydney, Australia, from 4 to 5 April 2019.