Security experts have learned many lessons from 2016 about how cyber warfare not only impacts elections but also has the potential to disrupt everything from energy and education to government services and military operations


For a long time, the ifconfig command was the default method for configuring a network interface. It served Linux users well, but networking is complex, and the commands to configure it must be robust.


SMTP TLS Reporting (TLS-RPT) is a standard that enables reporting issues in TLS connectivity experienced by applications that send emails and detect misconfigurations. It enables the reporting of email delivery issues that take place when an email isn’t encrypted with TLS.


The security of critical infrastructure components requires the governance and support of private sector organizations across various infrastructure sectors. Adopting, implementing, and integrating security practices across federal and private entities is necessary to achieve critical infrastructure cyber resiliency.


Is your system 100% ready to face the severest cyber-attack and mitigate the risk of a possible data breach? If you are unsure about your cyber-safety structure, then it’s time to upgrade it.


Network security firm SonicWall is investigating a coordinated attack in which attackers allegedly exploited vulnerabilities in the company’s products to breach its internal network. It’s the latest in a string of security vendors to become a target for attackers.


A recent discussion hosted by the RIPE NCC highlighted a number of key trends affecting the future of Resource Public Key Infrastructure (RPKI). The event, which drew around 90 participants worldwide, is worth watching as it reveals progress on Border Gateway Protocol (BGP) origination, convergence in routing systems, and difficulties in securing the BGP.


Hold on, wasn’t the point of Public Cloud to leverage services offered by third-party providers over the public internet? Why, then, would we want to contain traffic in our private IP space, which is likely routable across our on-premises network?


End-to-end encrypted platforms have become an important means to establish online trust for businesses and individuals globally – and law enforcement/intelligence services are struggling to keep up.


As one of the four key engines of compute and networking, we like to keep an eye on what is happening with field programmable gate arrays and the SoCs that incorporate them and have a mix of network and CPU and other accelerator circuits increasingly embedded on them.


Distributed denial-of-service (DDoS) attacks have been a staple of adversary toolkits longer than perhaps any other attack technique. Yet it’s popularity among cybercriminals shows no signs of abating.


In today’s evolving landscape of whitebox, brightbox, and software routing, a small but incredibly comprehensive routing platform called FreeRTR has quietly been evolving out of a research and education service provider network in Hungary.


After the SolarWinds breach that infected thousands of organizations and at least 250 federal agencies and businesses, and with new complex attacks like the one on the Vietnam Government Certification Authority, companies and executives are realizing how susceptible their own systems are to supply chain attacks.


Over the course of four days, watching the streaming, I enjoyed being part of the “audience” and learnt a lot from the presentations. At the same time, as an event organiser, I also learnt a lot about how a group of volunteers can put together a hugely successful online event!


As much as I’ve written about broadband and broadband technology, it struck me that I have never written a concise response to the question, “Why Fiber?”. Somebody asked me the question recently and I immediately knew I had never answered the question. If you’re going to build broadband and have a choice of technologies, why is fiber the best choice?