Guest Post: High-speed programmable switches are promising but share common design pitfalls that are potentially exploitable.
Spoofed packets allow senders to hide their source address. How do they work and why do they do it?
Guest Post: Now there is a way to identify if your network has deployed Source Address Validation for incoming traffic.
Guest Post: Addressing the obstacles network operators face when deploying BCP38 will help with reducing spoofing incidents.