Cyber threat intelligence sharing – ascending the pyramid of pain
Guest Post: Jason Smith shares CERT Australia’s experience with security automation and cyber threat intelligence sharing in this three part series.
Guest Post: Jason Smith shares CERT Australia’s experience with security automation and cyber threat intelligence sharing in this three part series.
As expected the presentations at AusCERT 2016 were great. Here are a few that caught my attention.
Recent high-level meetings and cybersecurity workshops demonstrate that Tonga is ready to move beyond talking and get down to the real work of starting a national CERT.
While the current open nature of DNS queries makes third party monitoring, interception, and substitution incredibly easy, there are now some grounds to be optimistic and start to contemplate a DNS environment that preserves privacy and integrity.
Guest Post: Verisign Labs has launched an experimental service to demonstrate the viability of a federated authentication system for RDAP. Find out more about the experiment and how you can participate.
The Internet of Things without the Internet is just things. So, what does the Internet bring to things to justify a capital T?
APNIC and RIPE NCC have collaborated to test prototype signer/validator implementations of a specification, which allows clients to verify that certified resource holders have authorized the creation of an RPSL object.
Should the IETF’s SIDR working group conclude with the emergence of BGPSEC? George Michaelson thinks so.
Guest Post: New Zealand’s recent Independent Review of Intelligence and Security makes some recommendations that should be of interest to the global Internet community.
‘Things’ in today’s Internet are not reliant on an IPv6 network, but that won’t always be the case.