Network Operations

Latest articles

RIPE NCC Information Security Controls Framework For Cloud Services

Ivo Dijkhuis

Information security controls help protect against vulnerabilities and risk. In this article, we share details of the RIPE NCC Cloud Security Controls Framework that we'll be using to assess whether cloud providers meet the security requirements for our services.

15 You have liked this article 0 times.
0

PeeringDB 2021 Product Report

Leo Vegoda

Data quality was ranked most important by respondents to PeeringDB's 2020 and 2021 user surveys. This update focuses on several improvements we've made to improve the quality of data going into PeeringDB and help users get precisely what they want out of it.

5 You have liked this article 0 times.
0

Pi-hole Installation Guide

Johannes Weber

Ever wondered how to set up Pi-hole with your own recursive DNS server using DNSSEC? Here's how!

17 You have liked this article 0 times.
0

Authentication and Authorisation Using Single Sign-On

Kathleen Moriarty

To prevent attacks, there's a push for multi-factor authentication. This is a vital step and should be considered if your organisation hasn't yet made the transition. But while MFA adds protections, how you implement single sign-on, authorisation, and/or federation requires consideration.

12 You have liked this article 0 times.
0

All articles

RIPE NCC Internet Country Report: Cyprus, Israel and Malta

Suzanne Taylor

We take a comprehensive look at three different countries in the Mediterranean region as the next in our series of RIPE NCC Internet Country Reports.

39 You have liked this article 0 times.
1

DNS Openness

Geoff Huston

Is the DNS open? And would its being open count as a strength or a weakness? These questions lie at the heart of discussions about the future of the Internet, but to answer them, first you have to ask what 'openness' amounts to when it comes to DNS.

dns
68 You have liked this article 0 times.
0

Why Are Authentication and Authorisation So Difficult?

Kathleen Moriarty

Let’s say you’re tasked with selecting a strong authentication solution for your organisation. Where do you begin? This article is the first of a series that will explore authentication and authorisation technologies in the context of recent exploits and developing trends.

13 You have liked this article 0 times.
0

Micro BGP Suite: The Swiss Army Knife of Routing Analysis

Lorenzo Cogotti

BGP Scanner from the Isolario project helped researchers analyse routing data, but it had its limitations. Overcoming these has led to the development of the Micro BGP Suite. It provides a variety of tools that, while each simple and efficient in their own operations, are capable of achieving compl…

11 You have liked this article 0 times.
0

NIS 2 (and the other EU regulation updates you need to know): November 2021

Suzanne Taylor

This is the latest in an ongoing series in which we give a brief overview of the most pertinent digital policies currently being proposed, debated and implemented in the European Union.

32 You have liked this article 0 times.
0

Should You Update Your Route Flap Damping Parameters?

Clemens Mosig

BGP Route Flap Damping (RFD) is recommended to suppress BGP churn. Default RFD configurations in routers have been shown to be harmful. Current configuration recommendations by the IETF and RIPE, however, are based on a study from 2010 which focused on IPv4 only. This article presents our recent me…

14 You have liked this article 0 times.
0

Showing 699 article(s)

Previous
1 2 3 ... 70
Next