Opinion: Crypto Zealots?
Is there a core of “crypto zealots” in the IETF that are pushing an extreme agenda about encryption?
Is there a core of “crypto zealots” in the IETF that are pushing an extreme agenda about encryption?
The FIRST TC Kathmandu meeting, held at APRICOT 2018, provided a snapshot of security mitigation measures in Nepal and the Asia Pacific region.
Since 2016, APNIC Labs has observed a drop in global DNSSEC adoption. Have we passed the point of peak use of DNSSEC?
Learn how the computers that generate and keep safe the cryptographic material required for signing the DNS root are dealt with when made redundant.
Guest Post: Addressing the obstacles network operators face when deploying BCP38 will help with reducing spoofing incidents.
Guest Post: Authentication and encryption should start at the edge of the network, with the end user.
APNIC and ICANN will deliver a Network Security workshop and DNSSEC tutorial in Tuvalu this March.
Guest Post: 2017 was marred by a number of highly publicized routing incidents, further demonstrating the lack of routing controls that could prevent them from happening.
Brush up on some security basics to help secure your servers.
While network security is best done in layers, a strong foundation is the most critical.