Network Operations

Latest articles

Phishing Tests: Are We Doing This Right?

Phishing Tests: Are We Doing This Right?

Kathleen Moriarty

4 min read

Phishing tests are a common cybersecurity practice, but do they truly prepare employees for real-world threats? In some cases, these tests can inadvertently create a false sense of security or even undermine existing security controls.

Article tags:

6 You have liked this article 0 times.
0
Building a Secure Test Environment for an IXP

Building a Secure Test Environment for an IXP

Marta Burocchi

10 min read

IXPs operate on principles of trust and cooperation upheld through adherence to clear rules. Quarantine VLAN is a way to help test whether new peers are compliant with those rules. Namex Digital Twin now enables Namex members to carry out these tests for themselves.

Article tags:

47 You have liked this article 0 times.
0
Francesca Bosco: Who Governs Cyberspace?

Francesca Bosco: Who Governs Cyberspace?

Anastasiya Pak

2 min read

In this episode, we dive into the evolving world of cyberspace and international cybersecurity law with Francesca Bosco from the CyberPeace Institute. Unpacking the evolving definition of cyberspace, the latest in international cybersecurity legislation, and its potential impact on civil society, F…

Article tags:

20 You have liked this article 0 times.
0
Why Small and Medium-Size Operators Should Care About Sustainability

Why Small and Medium-Size Operators Should Care About Sustainability

Michael Oghia

3 min read

A new resource dedicated to small and medium-sized digital infrastructure providers in Europe highlights the benefits of incorporating sustainability into their operations, offers a consolidated list of best practices and recommendations, and shares additional resources to help them make practical …

Article tags:

45 You have liked this article 0 times.
4

All articles

RPKI's 2024 Year in Review

RPKI's 2024 Year in Review

Job Snijders

7 min read

Having just closed the book on another orbit around the sun - let's look back at how RPKI did in 2024! In this memo I'll share some RPKI statistics, summarise highlights from the IETF Standards Development process, and reflect on emerging trends.

Article tags:

35 You have liked this article 0 times.
0
Namex Steps Into the Terabit Era

Namex Steps Into the Terabit Era

Flavio Luciani

7 min read

On 15 January, Namex reached a historic milestone: the first terabit of Internet network traffic, marking the beginning of a new chapter in its growth story. Coinciding with the broadcast of the Inter-Bologna football match by DAZN, the event highlighted the growing importance of live streaming for…

Article tags:

23 You have liked this article 0 times.
0
IGF 2024 Report

IGF 2024 Report

Ulka Athale

8 min read

The RIPE NCC team was at the 19th Internet Governance Forum held in Riyadh, Saudi Arabia. Here are some of our key takeaways from the last Internet event of 2024!

Article tags:

22 You have liked this article 0 times.
2
MENOG 24 - Meeting Report

MENOG 24 - Meeting Report

Kjerstin Burdiek

5 min read

The 24th edition of the Middle East Network Operators' Group (MENOG) and Peering Forum was held in Muscat, Oman, as the region continues to enhance its digital presence through better peering, stronger security and more effective regulations.

Article tags:

19 You have liked this article 0 times.
0
A Deep Dive Into the Baltic Sea Cable Cuts

A Deep Dive Into the Baltic Sea Cable Cuts

Emile Aben

25 min read

With last month’s cuts in two major Baltic Sea Internet cables now successfully repaired, and another cut having occurred in the meantime, we analyse these events and delve deeper into the question of how exactly the Internet has remained resilient.

Article tags:

60 You have liked this article 0 times.
0
Daniel Kapellmann: Detecting Cyber Threats to Critical Systems

Daniel Kapellmann: Detecting Cyber Threats to Critical Systems

Anastasiya Pak

2 min read

It is no longer unusual for Operational Technology systems to be connected to IT systems and the Internet, but this leaves them increasingly open to cyber threats. Daniel Kapellmann, Security Engineering Manager at Google Threat Intelligence, talks about how convergence of OT with IT systems amplif…

Article tags:

17 You have liked this article 0 times.
0

Showing 883 article(s)

Previous
1 2 3 ... 89
Next