Network Operations

Latest articles

Authenticated DNSSEC Bootstrapping: From Hackathon Project to Useful Software

Authenticated DNSSEC Bootstrapping: From Hackathon Project to Useful Software

Peter Thomassen

7 min read

At the RIPE DNS Hackathon 2023, a group of DNS enthusiasts started writing implementations of the Authenticated DNSSEC Bootstrapping protocol. After the event, the work continued, culminating in the completion of a module for Knot DNS. So what problem does the new feature address, and how can you u…

Article tags:

12 You have liked this article 0 times.
0
SEEing Growth at SEE 12

SEEing Growth at SEE 12

4 min read

On 22-23 April, the South East Europe (SEE) Internet community came together in Athens - the first time a SEE meeting has been held in Greece! 195 participants from 26 countries joined to discuss the history of the Internet, IPv6, RPKI, BGP and more.

Article tags:

15 You have liked this article 0 times.
0
Collaborative DDoS Mitigation: From Research to Operational Practice

Collaborative DDoS Mitigation: From Research to Operational Practice

Thijs van den Hout

11 min read

Distributed denial-of-service (DDoS) attacks continue to plague the Internet and pose a risk to the availability of critical digital systems that we increasingly depend on in our daily lives. Thijs van den Hout and his colleagues outline their contributions and lessons learned from 5 years of resea…

Article tags:

51 You have liked this article 0 times.
0
Retiring ns.ripe.net

Retiring ns.ripe.net

8 min read

Since 1992, the RIPE NCC has been the only Regional Internet Registry to offer a secondary DNS server to its members, called ns.ripe.net. LIRs with a /16-sized IPv4 allocation or a /32-sized IPv6 allocation have been able to use this service to ensure the stability of the DNS service for these larg…

Article tags:

56 You have liked this article 0 times.
0

All articles

What Is NIS2 and Why Is It Important?

What Is NIS2 and Why Is It Important?

Fredrik Lindeberg

9 min read

With NIS2 soon coming into force, Fredrik Lindeberg looks at the key points of the new directive, the relationship between process and operational security and what actions you should take now.

Article tags:

71 You have liked this article 0 times.
0
Bert Hubert: Internet Privacy and the Cost of Losing Control

Bert Hubert: Internet Privacy and the Cost of Losing Control

Alun Davies

2 min read

Internet users, the companies who sell us our devices, and governments are all caught up in the struggle for online privacy. In this episode, Bert Hubert explains how outsourcing and other market forces determine the flow of control over personal data and why we need to understand the consequences.

Article tags:

235 You have liked this article 0 times.
0
Advancing Internet Technologies in South East Europe

Advancing Internet Technologies in South East Europe

Qasim Lone

13 min read

On 22-23 April, the South East Europe Internet community will come together in Athens, Greece, to explore trends in the adoption of Internet technologies across the region. In preparation for the discussions to take place, we’ve been examining changes in key Internet tech, such as IPv6 and RPKI.

Article tags:

103 You have liked this article 0 times.
0
Enhancing the Security of RIPE NCC Access - Recent and Upcoming Changes

Enhancing the Security of RIPE NCC Access - Recent and Upcoming Changes

Felipe Victolla Silveira

4 min read

Over the past few months, the RIPE NCC has been working on enhancing the security of RIPE NCC Access, the Single Sign-On (SSO) system for accessing our key services. In this article, I explain the recent enhancements we've implemented and provide an overview of forthcoming developments you can anti…

Article tags:

339 You have liked this article 0 times.
0
Automated Assurance on a Path to Becoming Practical

Automated Assurance on a Path to Becoming Practical

Kathleen Moriarty

7 min read

Cloud native architecture is a game changer for security at scale. Whether used on-premises or in the cloud, capabilities to ease the management of IT assets are improving. And while there’s a long way to go in simplifying interfaces and reducing skill-set barriers – this too will come in time.

Article tags:

50 You have liked this article 0 times.
0
Cloudy with a Chance of Cyberattacks - Dangling Resource Abuse on Cloud Platforms

Cloudy with a Chance of Cyberattacks - Dangling Resource Abuse on Cloud Platforms

Haya Schulmann

7 min read

Dangling DNS records are a target for bad actors, but distinguishing malicious from legitimate changes in resources isn't always easy. The team from ATHENE report on the main findings of their research into the abuse of dangling resources in the cloud.

Article tags:

48 You have liked this article 0 times.
0

Showing 837 article(s)

Previous
1 2 3 ... 84
Next