Banner image

Network Operations

All articles

iot-sec

Embedded IoT Security: Helping Vendors in the Design Process

Author image
Kathleen Moriarty

5 min read

With the number of IoT devices on track to exceed 30 billion within the next couple of years, CIS has created a resource that will help IoT vendors ease the process of building in security by design and by default.

Article tags:

18 Likes are disabled for this article.
0
swedish_icelandic_blue

Insights from the World’s Largest Cyber Defence Exercise

Author image
Robert Allen

6 min read

On 22 April 2023, the Sweden-Iceland team led by Patrik Fältström, together with Brynja Huld Óskarsdóttir from Iceland, emerged victorious ahead of 23 other national teams in the prestigious cyber defence exercise Locked Shields (18-21 April 2023).

Article tags:

16 Likes are disabled for this article.
0
egov

E-gov DNS: Are They Redundant Enough?

Author image
Giovane Moura

7 min read

Electronic government (e-gov) lets citizens interact with their government via the Internet. The DNS, which maps e-gov domain names to Internet addresses, underpins e-gov. Working with the University of Twente and NCSC-NL, SIDN Labs compare the resiliency and redundancy of e-gov domains for the Net…

Article tags:

15 Likes are disabled for this article.
0
CE_country_report_cover

RIPE NCC Internet Country Report: Central Europe

Author image
Suzanne Taylor

3 min read

We take a comprehensive look at four countries in Central Europe as the next in our series of RIPE NCC Internet Country Reports.

Article tags:

51 Likes are disabled for this article.
0
quantum_fud

Separating FUD from Practical for Post-Quantum Cryptography

Author image
Kathleen Moriarty

6 min read

A practical approach to avoid falling into fear, uncertainty, and doubt (FUD) around post-quantum cryptography breaks down into three steps. Find out more in this guest post from Kathleen Moriarty, CTO of the Center for Internet Security.

Article tags:

10 Likes are disabled for this article.
0
bgp-message

Unknown Attribute 28 - A Source Of Entropy in Interdomain Routing?

Author image
Emile Aben

13 min read

On 2 June 2023, there was a disruption in Internet interdomain routing. We got notified of recurring resets of some routers that take care of routing between networks, due to malformed BGP packets with BGP attribute 28. Here we take a first look at the event through RIS and offer some initial ideas…

Article tags:

70 Likes are disabled for this article.
6
iStock-1401716855

Usage Patterns of RIS Live at Code BGP

8 min read

RIS Live is a reliable, well-designed, operationally robust API that provides a real-time view of BGP updates. In this article, the team from Code BGP talk through the RIS Live features that have helped them build a platform capable of detecting and resolving BGP issues in seconds

Article tags:

28 Likes are disabled for this article.
0
Ethernet_pixabay

From Megabits to Terabits: Ethernet Celebrates Its Birthday

Author image
Ondřej Caletka

10 min read

Exactly fifty years ago, the first concept of the computer networks we know today as Ethernet was designed. It has evolved from a thick coaxial cable connecting computers in a single location to the most common way of connecting networks of all sizes via twisted pair and optical fibre.

Article tags:

50 Likes are disabled for this article.
0
podcast_cover

Lefteris Manassakis: In Defence of BGP

Author image
Alun Davies

2 min read

BGP is the Internet's de facto routing protocol - but relatively few have a deep understanding of its vulnerabilities. Delving into threats posed by misconfigurations and hijacks, Lefteris Manassakis discusses BGP and the importance of mitigation, monitoring, and detection with ARTEMIS and Code BGP.

Article tags:

55 Likes are disabled for this article.
0
netnodQA

How to Ensure Robust DNS Services for the Public Sector

Author image
Robert Allen

6 min read

What do public sector organisations need to know to ensure they are protected and that their DNS services are as secure and robust as possible? The team from Netnod poses the questions all such organisations should be asking their DNS providers.

Article tags:

20 Likes are disabled for this article.
2

Showing 889 article(s)