Will the SIDR model succeed where the IRR model failed? (Part II)
Guest Post: In Part II of the post, Cengiz Alaettinoglu shares some insights into the low adoption of the IRR model in the hope it might increase adoption of the SIDR model.
Guest Post: In Part II of the post, Cengiz Alaettinoglu shares some insights into the low adoption of the IRR model in the hope it might increase adoption of the SIDR model.
Guest post: In this two-part post, PacketDesign’s Cengiz Alaettinoglou, gives a brief overview and comparison of the IRR and SIDR security models.
APNIC participated at the 51st Asia Pacific Economic Cooperation Telecommunications and Information Working Group (APEC TEL 51) from 11-16 May 2015, in Boracay Island, Philippines.
Are we going about protecting ourselves from malicious DNS activity in the right way?
The huge changes which the DNS has had to accommodate were highlighted at the DNS-OARC Workshop on the weekend.
So, where can one get really helpful lessons-learned from data breach incidents?
Secure you place now at the APNIC 40 workshops. Choose from MPLS Deployment, Advanced BGP and Network Security.
Representatives from the organizations responsible for the coordination of the Internet’s technical infrastructure met in London last week – here’s my thoughts on the meeting’s important topics.
As the dust settled from the Global Conference on Cyber Security, four APNIC staff members recorded a podcast discussing APNIC’s work in cyber security.
Has “security failed”, as recently claimed at the RSA Conference?