Banner image

Network Operations

All articles

cloud security

RIPE NCC Information Security Controls Framework For Cloud Services

Author image
Ivo Dijkhuis

8 min read

Information security controls help protect against vulnerabilities and risk. In this article, we share details of the RIPE NCC Cloud Security Controls Framework that we'll be using to assess whether cloud providers meet the security requirements for our services.

Article tags:

31 Likes are disabled for this article.
0
peeringdb

PeeringDB 2021 Product Report

Author image
Leo Vegoda

4 min read

Data quality was ranked most important by respondents to PeeringDB's 2020 and 2021 user surveys. This update focuses on several improvements we've made to improve the quality of data going into PeeringDB and help users get precisely what they want out of it.

Article tags:

6 Likes are disabled for this article.
0
authorisation

Authentication and Authorisation Using Single Sign-On

Author image
Kathleen Moriarty

5 min read

To prevent attacks, there's a push for multi-factor authentication. This is a vital step and should be considered if your organisation hasn't yet made the transition. But while MFA adds protections, how you implement single sign-on, authorisation, and/or federation requires consideration.

Article tags:

12 Likes are disabled for this article.
0
ripe ncc country report - cyprus, israel, malta

RIPE NCC Internet Country Report: Cyprus, Israel and Malta

Author image
Suzanne Taylor

4 min read

We take a comprehensive look at three different countries in the Mediterranean region as the next in our series of RIPE NCC Internet Country Reports.

Article tags:

40 Likes are disabled for this article.
1
open

DNS Openness

Author image
Geoff Huston

52 min read

Is the DNS open? And would its being open count as a strength or a weakness? These questions lie at the heart of discussions about the future of the Internet, but to answer them, first you have to ask what 'openness' amounts to when it comes to DNS.

Article tags:

68 Likes are disabled for this article.
0
maze

Why Are Authentication and Authorisation So Difficult?

Author image
Kathleen Moriarty

12 min read

Let’s say you’re tasked with selecting a strong authentication solution for your organisation. Where do you begin? This article is the first of a series that will explore authentication and authorisation technologies in the context of recent exploits and developing trends.

Article tags:

14 Likes are disabled for this article.
0
swiss knife

Micro BGP Suite: The Swiss Army Knife of Routing Analysis

Author image
Lorenzo Cogotti

7 min read

BGP Scanner from the Isolario project helped researchers analyse routing data, but it had its limitations. Overcoming these has led to the development of the Micro BGP Suite. It provides a variety of tools that, while each simple and efficient in their own operations, are capable of achieving compl…

Article tags:

12 Likes are disabled for this article.
0
How EU Regulation Affects You

NIS 2 (and the other EU regulation updates you need to know): November 2021

Author image
Suzanne Taylor

12 min read

This is the latest in an ongoing series in which we give a brief overview of the most pertinent digital policies currently being proposed, debated and implemented in the European Union.

Article tags:

34 Likes are disabled for this article.
0
heatmap.png

Should You Update Your Route Flap Damping Parameters?

Author image
Clemens Mosig

9 min read

BGP Route Flap Damping (RFD) is recommended to suppress BGP churn. Default RFD configurations in routers have been shown to be harmful. Current configuration recommendations by the IETF and RIPE, however, are based on a study from 2010 which focused on IPv4 only. This article presents our recent me…

Article tags:

20 Likes are disabled for this article.
0

Showing 889 article(s)