Banner image

Network Operations

All articles

see_12_cover_final

Advancing Internet Technologies in South East Europe

Author image
Qasim Lone

13 min read

On 22-23 April, the South East Europe Internet community will come together in Athens, Greece, to explore trends in the adoption of Internet technologies across the region. In preparation for the discussions to take place, we’ve been examining changes in key Internet tech, such as IPv6 and RPKI.

Article tags:

104 Likes are disabled for this article.
0
ripe_ncc_open

Enhancing the Security of RIPE NCC Access - Recent and Upcoming Changes

Author image
Felipe Victolla Silveira

4 min read

Over the past few months, the RIPE NCC has been working on enhancing the security of RIPE NCC Access, the Single Sign-On (SSO) system for accessing our key services. In this article, I explain the recent enhancements we've implemented and provide an overview of forthcoming developments you can anti…

Article tags:

349 Likes are disabled for this article.
0
iStock-1333374149

Automated Assurance on a Path to Becoming Practical

Author image
Kathleen Moriarty

7 min read

Cloud native architecture is a game changer for security at scale. Whether used on-premises or in the cloud, capabilities to ease the management of IT assets are improving. And while there’s a long way to go in simplifying interfaces and reducing skill-set barriers – this too will come in time.

Article tags:

82 Likes are disabled for this article.
0
iStock-1549941880

Cloudy with a Chance of Cyberattacks - Dangling Resource Abuse on Cloud Platforms

Author image
Haya Schulmann

7 min read

Dangling DNS records are a target for bad actors, but distinguishing malicious from legitimate changes in resources isn't always easy. The team from ATHENE report on the main findings of their research into the abuse of dangling resources in the cloud.

Article tags:

85 Likes are disabled for this article.
0
1080x1080px_01_v03_Ripe-Labs-podcast_E-01 (2)

Geoff Huston: Starlink and the Future of Low-Orbit Internet

Author image
Anastasiya Pak

1 min read

Starlink's megaconstellations deliver broadband Internet to customers around the globe. But while the tech promises to democratise Internet access, it's not always clear how existing protocols and regulations apply beyond the clouds. In this episode, Geoff Huston talks about the future of low-orbit…

Article tags:

108 Likes are disabled for this article.
0
eu_russia

Internet Sanctions on Russian Media: Diverging Actions and Mixed Effects

Author image
Moritz Müller

10 min read

EU sanctions on Russian controlled content require ISPs in member states to block access to websites. But our research reveals that their implementation varies widely, both between and within individual EU member states, raising important questions about their effectiveness.

Article tags:

92 Likes are disabled for this article.
0
iStock-2023180119

KeyTrap

Author image
Geoff Huston

12 min read

Just how ‘devastating’ is the KeyTrap vulnerability? How does it work, and why the dramatic response?

Article tags:

37 Likes are disabled for this article.
0
time_pool

NTP Pool - The Internet Timekeeper

Author image
Giovane Moura

12 min read

The NTP Pool is a network of volunteer-run servers providing time synchronisation services to millions of computers over the Internet using the Network Time Protocol (NTP). But how does it map clients to NTP servers? And why are some clients more equal than others? The team at SIDN Labs investigate…

Article tags:

93 Likes are disabled for this article.
2
balance

As the Balance of Security Controls Shifts, Where Does Responsibility Rest?

Author image
Kathleen Moriarty

4 min read

Ongoing debates on encryption and privacy highlight the complex dance between industry standards and policy. The outcome of these security and surveillance tussles remains open, reflecting the evolving relationship between technology and governance.

Article tags:

63 Likes are disabled for this article.
0
nro_rirs

Improving RIR Alignment in the RPKI Space

Author image
Sofía Silva Berenguer

2 min read

The NRO are working toward a robust, coordinated, and secure RPKI service.

Article tags:

19 Likes are disabled for this article.
0

Showing 889 article(s)

Previous
1 ... 5 6 7 8 9 ... 89
Next