Securing IoT wireless sensor networks
Guest Post: How can a wireless sensor network be secured without impairing the performance and behaviour of the network?
Guest Post: How can a wireless sensor network be secured without impairing the performance and behaviour of the network?
Guest Post: Dr Di Ma briefly describes the implementation of open source RPKI Relying Party software, RPSTIR.
The recent FIRST Regional Symposium for the Asia Pacific provided a trusted forum for security response teams and analysts to get together and share knowledge about improving network security.
Hacker communities such as Taiwan’s HITCON GIRLS are encouraging more women to become involved in cybersecurity.
APNIC staff participated at the 44th Asia-Pacific Advanced Network meeting held in Dalian, China from 26 August to 1 September.
Guest Post: A new community service tool allows Internet users to see if their IP address has been seen to be misbehaving or in use by an infected host.
Guest Post: Discover what it’s like to participate in a cybersecurity incident role play.
Guest Post: Researchers want a better understanding of security misconfigurations and why they occur — can you help?
Interest in the DNS appears to come in waves and we seem to be be in the midst of a furious burst of activity.
Security of the Domain Name System, and privacy, was a topic of much discussion during the recent DNS operations Working Group.