Featured article

Bert Hubert: Internet Privacy and the Cost of Losing Control

Alun Davies

Based in Amsterdam

Internet users, the companies who sell us our devices, and governments are all caught up in the struggle for online privacy. In this episode, Bert Hubert explains how outsourcing and other market forces determine the flow of control over personal data and why we need to understand the consequences.

Read article
49 You have liked this article 0 times.
0

Latest articles

Building a Stable Future for the RIPE NCC

Building a Stable Future for the RIPE NCC

Remco van Mook

12 min read

The RIPE NCC’s mission to support a free, open and global Internet is becoming increasingly demanding. This is raising costs at a time when there is less agreement on how they should be distributed. We need to agree on a roadmap for the decades ahead so the RIPE NCC remains stable and fit for the m…

Article tags:

108 You have liked this article 0 times.
6
Advancing Internet Technologies in South East Europe

Advancing Internet Technologies in South East Europe

Qasim Lone

13 min read

On 22-23 April, the South East Europe Internet community will come together in Athens, Greece, to explore trends in the adoption of Internet technologies across the region. In preparation for the discussions to take place, we’ve been examining changes in key Internet tech, such as IPv6 and RPKI.

Article tags:

67 You have liked this article 0 times.
0
The RIPE Chair Team Reports - April 2024

The RIPE Chair Team Reports - April 2024

Mirjam Kühne

6 min read

With a May RIPE Meeting closing in fast, and plenty of recent developments in community activities and Internet governance, the RIPE Chair Team reports on all the major goings on this April.

Article tags:

9 You have liked this article 0 times.
0
Enhancing the Security of RIPE NCC Access - Recent and Upcoming Changes

Enhancing the Security of RIPE NCC Access - Recent and Upcoming Changes

Felipe Victolla Silveira

4 min read

Over the past few months, the RIPE NCC has been working on enhancing the security of RIPE NCC Access, the Single Sign-On (SSO) system for accessing our key services. In this article, I explain the recent enhancements we've implemented and provide an overview of forthcoming developments you can anti…

Article tags:

298 You have liked this article 0 times.
0
Automated Assurance on a Path to Becoming Practical

Automated Assurance on a Path to Becoming Practical

Kathleen Moriarty

7 min read

Cloud native architecture is a game changer for security at scale. Whether used on-premises or in the cloud, capabilities to ease the management of IT assets are improving. And while there’s a long way to go in simplifying interfaces and reducing skill-set barriers – this too will come in time.

Article tags:

16 You have liked this article 0 times.
0
Cloudy with a Chance of Cyberattacks - Dangling Resource Abuse on Cloud Platforms

Cloudy with a Chance of Cyberattacks - Dangling Resource Abuse on Cloud Platforms

Haya Schulmann

7 min read

Dangling DNS records are a target for bad actors, but distinguishing malicious from legitimate changes in resources isn't always easy. The team from ATHENE report on the main findings of their research into the abuse of dangling resources in the cloud.

Article tags:

11 You have liked this article 0 times.
0
Criteria for the Accreditation of Regional Internet Registries

Criteria for the Accreditation of Regional Internet Registries

Athina Fragkouli

8 min read

ICP-2 - a document spelling out criteria for the establishment of new RIRs - was published all the way back in 2001. And while the requirements it lays out remain applicable to all RIRs, more recent events have revealed missing pieces that it's up to the community to fill in.

Article tags:

74 You have liked this article 0 times.
4
View all articles

Latest Podcasts

  • Bert Hubert: Internet Privacy and the Cost of Losing Control

    Bert Hubert: Internet Privacy and the Cost of Losing Control

    Alun Davies

    Internet users, the companies who sell us our devices, and governments are all caught up in the struggle for online privacy. In this episode, Bert Hubert explains how outsourcing and other market forces determine the flow of control over personal data and why we need to understand the consequences.

    Article tags:

    49 You have liked this article 0 times.
    0
  • Geoff Huston: Starlink and the Future of Low-Orbit Internet

    Geoff Huston: Starlink and the Future of Low-Orbit Internet

    Anastasiya Pak

    Starlink's megaconstellations deliver broadband Internet to customers around the globe. But while the tech promises to democratise Internet access, it's not always clear how existing protocols and regulations apply beyond the clouds. In this episode, Geoff Huston talks about the future of low-orbit…

    Article tags:

    27 You have liked this article 0 times.
    0
  • View all

Editor's Pick

  • 10 Years of Legacy Policy

    10 Years of Legacy Policy

    Xavier Le Bris

    9 min read

    10 years ago, consensus was reached on the legacy policy. In this article, we report on the current status of legacy address space administered by the RIPE NCC and a look at what's changed over the past decade.

    658 You have liked this article 0 times.
    2
  • Palestine Internet Connectivity as Seen in BGP

    Palestine Internet Connectivity as Seen in BGP

    Qasim Lone

    9 min read

    What does Internet routing data tell us about how the Internet in Palestine has fared since the outbreak of war in October.

    Article tags:

    91 You have liked this article 0 times.
    0