Women in ICT: Curious about cybersecurity
Raja Azrina reflects on her 20 plus years working in the ICT/Network Security industry in Malaysia and discusses the potential for more females to choose careers in cybersecurity.
Raja Azrina reflects on her 20 plus years working in the ICT/Network Security industry in Malaysia and discusses the potential for more females to choose careers in cybersecurity.
What’s new, what’s old and what’s been forgotten in the past ten years of the Internet’s evolution?
Guest Post: A new, open-source platform allows you to assess the current state of Route Origin Validation deployment.
Guest Post: With TLSv1.3 approved and in the IETF publication queue, it’s time to think about deployment options and obstacles, and planning for changes inherent in this revision.
Guest Post: Network monitoring activities will need to be considered in TLSv1.3 deployment plans.
Guest Post: While it appears there is a learning curve prior to adoption, TLSv1.3 should be strongly considered to improve the security of web sessions.
Guest Post: What is the scale of routing vulnerability attacks and how does it evolve over time?
Guest Post: Learn the basics for configuring ip6tables in the Ubuntu 16.04 system.
Guest Post: A team of cybersecurity researchers are seeking to understand how malware infects home routers to develop ways to protect them from being used in DDoS attacks.
Guest Post: Guarding against server impersonation attacks using Server Location Verification.