CGN, IPv6 and fighting online crime…
Guest Post: Europol is consulting with the Internet community on how network operators can be encouraged to deploy IPv6.
Guest Post: Europol is consulting with the Internet community on how network operators can be encouraged to deploy IPv6.
Guest Post: Be prepared! Get to know the facts about amplification DDoS attacks.
Guest Post: Response Policy Zone technology in resolver software is increasing the number of DNS resolver services.
Is there a core of “crypto zealots” in the IETF that are pushing an extreme agenda about encryption?
The FIRST TC Kathmandu meeting, held at APRICOT 2018, provided a snapshot of security mitigation measures in Nepal and the Asia Pacific region.
Since 2016, APNIC Labs has observed a drop in global DNSSEC adoption. Have we passed the point of peak use of DNSSEC?
Learn how the computers that generate and keep safe the cryptographic material required for signing the DNS root are dealt with when made redundant.
Guest Post: Addressing the obstacles network operators face when deploying BCP38 will help with reducing spoofing incidents.
Guest Post: Authentication and encryption should start at the edge of the network, with the end user.
APNIC and ICANN will deliver a Network Security workshop and DNSSEC tutorial in Tuvalu this March.