An introspective analysis: RPKI deployment under scrutiny
Guest Post: What challenges must RPKI overcome before achieving full global deployment?
View ArticleccTLD phishing characterization
Guest Post: A longitudinal analysis of phishing attacks observed at three ccTLDs registries that manage more than 8M active domains.
View ArticleOlympeaks: The impact of the Paris 2024 Olympics on Internet traffic
Guest Post: The ‘Olympeaks Observatory’ tracked record-breaking peaks on Internet traffic during the 2024 Olympics.
View ArticleA comprehensive guide to achieving ISO/IEC 27001:2022 certification
How to: A detailed step-by-step guide to ISO/IEC 27001:2022 certification.
View ArticleICYMI: Backblaze has announced support for IPv6
Interesting insight into a recent IPv6 deployment.
View ArticleRPKI: Deployed is better than perfect
Guest Post: Is RPKI stable enough to meet the recent White House roadmap expectations?
View ArticleWeb PKI: How to protect a popular security service?
Guest Post: Lessons learned from a study on the interrelation of CAA, CT, and DANE in web PKI deployments.
View Article[Podcast] Focusing purely on technology limits the understanding of Internet...
Nowmay Opalinski discusses the GEODE project and his analysis of Internet fragility in Pakistan.
View ArticleInternet of Things BoF at APNIC 58
Guest Post: IoT Alliance, IPv6 city update, IoMT, IPv6 addresses for non-electronic items, and more from the first-ever IoT BoF at an APNIC conference.
View ArticleSMTP downgrade attacks and MTA-STS
Guest Post: Auditing prominent mail providers to discover how they handle email encryption and show how MTA-STS can help improve email security.
View ArticleAPNIC registry API now available
The new APNIC registry API supports the retrieval of delegation information, as well as the management of whois records, RDNS records, ROAs, and route objects.
View ArticlePowering the future of data centres — Co-Packaged Optics
Guest Post: The advantages and challenges of CPOs.
View ArticleHow to inspect TLS encrypted traffic
Guest Post: Three methods to decrypt TLS traffic, how each works, and when to use them.
View ArticleHighlights of AINTEC 2024
Measuring GenAI usage patterns, dynamic fixed-point values in eBPF, improving TCP/IP performance and more from AINTEC 2024.
View ArticleEmpowering remote agricultural communities in Lao PDR through IoT technology
Guest Post: Developing affordable IoT technology to provide reliable, relevant agricultural data and forecasting information for remote farmers.
View Article[Podcast] The back of the class: Looking at 240/4 reachability
Geoff Huston discusses measuring the routability of 240.0.0.0/4 class-E addresses.
View ArticleThe strange cases of consumer-grade routers on puny power supplies
Guest Post: Investigating the least likely suspect in router configuration.
View ArticleThe IPv6 transition
How much longer is this transition to IPv6 going to take and does it even matter?
View ArticleA free and open source IPv6 textbook
A free, comprehensive, continuously revised, and open source resource on IPv6.
View ArticleSerial BGP hijackers: A reproducibility study and assessment of current dynamics
Guest Post: Profiling serial hijackers with less data than previous efforts while achieving similar accuracy.
View ArticleApply now for an APRICOT 2025 Fellowship
APRICOT is offering a limited number of fellowships in the lead up to APRICOT 2025. Apply now!
View ArticleThe realities of building an IPv6-only city
Guest Post: Practical lessons learned from deploying city-wide greenfield IPv6-only.
View ArticleThe Starlink vs cable conundrum in the Pacific
Guest Post: Could Starlink availability discourage undersea cable development for small island economies?
View Article[Podcast] A student-led IPv6 deployment at NITK Karnataka
Two newcomers share their multi-year IPv6 deployment project and their experience with the IETF process.
View ArticleUsing honeybuckets to characterize cloud storage scanning in the wild
Guest Post: Researchers investigate the methods and frequency with which attackers target poorly secured cloud storage buckets.
View ArticleComparing Carrier Ethernet transport technologies
Guest Post: How to evaluate the pros and cons of Carrier Ethernet transport technology and choose the right solution.
View ArticleTowards a collaborative future with NOG networks
Insights from Maldives IGF 2024 and the potential of MVNOG.
View ArticleThe rise of packet rate attacks: When core routers turn evil
Guest Post: Fresh insights into the growing threat of high packet rate attacks.
View Article