DDoS attackers – who and why?
Distributed Denial of Service (DDoS) attacks are on the increase. But what are the motivations of the attackers?
Distributed Denial of Service (DDoS) attacks are on the increase. But what are the motivations of the attackers?
There’s less than two weeks to go – start planning your APNIC 42 experience!
Guest Post: In the second part of this series we look at why HTTPS has become so popular among users and web domain owners.
Guest Post: Security expert Barry Greene discusses best practices to monitor for spoofed packets coming from your network.
Guest Post: Learn what HTTPS is, where it came from, and how you can implement it in the first of this three-part series.
APNIC participated at the Workshop on Cybersecurity for ASEAN Countries held in Singapore from 16 to 18 August.
The South Asian Network Operators Group returned to Mumbai, India for their 28th conference – SANOG 28 – held from 1 to 9 August 2016.
Guest Post: Cybersecurity consultant Wassie Goushe discusses the benefits of developing localized cybersecurity solutions that work for your situation.
Guest Post: Google’s Warren Kumari discusses the benefits of Next Secure (NSEC) and why it needs to be used in a more aggressive manner.
ICANN recently announced the operational plans to “roll” the Root Zone Key Signing Key, an essential part of DNSSEC.