Network Operations

All articles

Embedded IoT Security: Helping Vendors in the Design Process

Embedded IoT Security: Helping Vendors in the Design Process

Kathleen Moriarty

5 min read

With the number of IoT devices on track to exceed 30 billion within the next couple of years, CIS has created a resource that will help IoT vendors ease the process of building in security by design and by default.

Article tags:

18 You have liked this article 0 times.
0
Insights from the World’s Largest Cyber Defence Exercise

Insights from the World’s Largest Cyber Defence Exercise

Robert Allen

6 min read

On 22 April 2023, the Sweden-Iceland team led by Patrik Fältström, together with Brynja Huld Óskarsdóttir from Iceland, emerged victorious ahead of 23 other national teams in the prestigious cyber defence exercise Locked Shields (18-21 April 2023).

Article tags:

16 You have liked this article 0 times.
0
E-gov DNS: Are They Redundant Enough?

E-gov DNS: Are They Redundant Enough?

Giovane Moura

7 min read

Electronic government (e-gov) lets citizens interact with their government via the Internet. The DNS, which maps e-gov domain names to Internet addresses, underpins e-gov. Working with the University of Twente and NCSC-NL, SIDN Labs compare the resiliency and redundancy of e-gov domains for the Net…

Article tags:

15 You have liked this article 0 times.
0
RIPE NCC Internet Country Report: Central Europe

RIPE NCC Internet Country Report: Central Europe

Suzanne Taylor

3 min read

We take a comprehensive look at four countries in Central Europe as the next in our series of RIPE NCC Internet Country Reports.

Article tags:

51 You have liked this article 0 times.
0
Separating FUD from Practical for Post-Quantum Cryptography

Separating FUD from Practical for Post-Quantum Cryptography

Kathleen Moriarty

6 min read

A practical approach to avoid falling into fear, uncertainty, and doubt (FUD) around post-quantum cryptography breaks down into three steps. Find out more in this guest post from Kathleen Moriarty, CTO of the Center for Internet Security.

Article tags:

10 You have liked this article 0 times.
0
Unknown Attribute 28 - A Source Of Entropy in Interdomain Routing?

Unknown Attribute 28 - A Source Of Entropy in Interdomain Routing?

Emile Aben

13 min read

On 2 June 2023, there was a disruption in Internet interdomain routing. We got notified of recurring resets of some routers that take care of routing between networks, due to malformed BGP packets with BGP attribute 28. Here we take a first look at the event through RIS and offer some initial ideas…

Article tags:

70 You have liked this article 0 times.
6
Usage Patterns of RIS Live at Code BGP

Usage Patterns of RIS Live at Code BGP

8 min read

RIS Live is a reliable, well-designed, operationally robust API that provides a real-time view of BGP updates. In this article, the team from Code BGP talk through the RIS Live features that have helped them build a platform capable of detecting and resolving BGP issues in seconds

Article tags:

28 You have liked this article 0 times.
0
From Megabits to Terabits: Ethernet Celebrates Its Birthday

From Megabits to Terabits: Ethernet Celebrates Its Birthday

Ondřej Caletka

10 min read

Exactly fifty years ago, the first concept of the computer networks we know today as Ethernet was designed. It has evolved from a thick coaxial cable connecting computers in a single location to the most common way of connecting networks of all sizes via twisted pair and optical fibre.

Article tags:

50 You have liked this article 0 times.
0
Lefteris Manassakis: In Defence of BGP

Lefteris Manassakis: In Defence of BGP

Alun Davies

2 min read

BGP is the Internet's de facto routing protocol - but relatively few have a deep understanding of its vulnerabilities. Delving into threats posed by misconfigurations and hijacks, Lefteris Manassakis discusses BGP and the importance of mitigation, monitoring, and detection with ARTEMIS and Code BGP.

Article tags:

55 You have liked this article 0 times.
0
How to Ensure Robust DNS Services for the Public Sector

How to Ensure Robust DNS Services for the Public Sector

Robert Allen

6 min read

What do public sector organisations need to know to ensure they are protected and that their DNS services are as secure and robust as possible? The team from Netnod poses the questions all such organisations should be asking their DNS providers.

Article tags:

20 You have liked this article 0 times.
2

Showing 879 article(s)

Previous
1 ... 9 10 11 12 13 ... 88
Next