NANOG 63: BGP Route Hijacks
Geoff Huston outlines some examples of route hijacks from a presentation by Andree Toonk at NANOG 63.
Geoff Huston outlines some examples of route hijacks from a presentation by Andree Toonk at NANOG 63.
There are a variety of topics offered – DNS, IPv6, Network Security, Routing and Internet Resource Management free to access from the comfort of your office.
Are you Ready to ROA? Adli Wahid discusses Resource Origin Authorizations and why you should create yours now in MyAPNIC.
To welcome in the new year, APNIC asked a cross section of the Asia-Pacific numbering community for their thoughts on last year, and for their predictions for the Internet in 2015.
Host an APNIC Training event and help regional network engineers and operators learn the knowledge required to build the Internet.
Here’s your top 3 Security blog posts from 2014.
APNIC staff attended the ninth annual NASSCOM-DSCI Summit in Mumbai, India 10-11 December.
The head of the Australian federal government’s new Cyber Security Centre, spoke recently on attribution, and it got me thinking.
I first learned about the Modern Honeypot (MHN) at the ThreatStream’s booth while I was attending the FIRST.org Annual Conference and AGM in Boston last June.
Over 1,000 participants from over 100 countries and regions attended the first World Internet Conference (WIC) held in Wuzhen, China