Are you part of the DDoS problem?
Guest Post: Security expert Barry Greene discusses best practices to monitor for spoofed packets coming from your network.
Guest Post: Security expert Barry Greene discusses best practices to monitor for spoofed packets coming from your network.
Guest Post: Learn what HTTPS is, where it came from, and how you can implement it in the first of this three-part series.
APNIC participated at the Workshop on Cybersecurity for ASEAN Countries held in Singapore from 16 to 18 August.
The South Asian Network Operators Group returned to Mumbai, India for their 28th conference – SANOG 28 – held from 1 to 9 August 2016.
Guest Post: Cybersecurity consultant Wassie Goushe discusses the benefits of developing localized cybersecurity solutions that work for your situation.
Guest Post: Google’s Warren Kumari discusses the benefits of Next Secure (NSEC) and why it needs to be used in a more aggressive manner.
ICANN recently announced the operational plans to “roll” the Root Zone Key Signing Key, an essential part of DNSSEC.
APNIC is participating in a series of meetings that form the preparatory process for the ITU WTSA-16.
APNIC recently participated in a JICA workshop for CERTs from Laos, Myanmar, Cambodia, Viet Nam and Indonesia.
Register for this two-day intermediate level workshop being held in conjunction with the HKNOG 3.0 conference, from 7 to 8 September in Hong Kong.