Banner image

Network Operations

All articles

netnod_clocks

Do You Need IS027001 Compliance? Then Check Your Clocks!

Author image
Fredrik Lindeberg

4 min read

ISO27001 compliance now relies on accurate and redundant time. The latest guidelines make specific recommendations about what time sources you should use and the setup you need. So how do you ensure your organisation is compliant? Netnod’s Security Expert, Fredrik Lindeberg, answers.

Article tags:

20 Likes are disabled for this article.
0
iStock-1301397469

The Need for Programmability in Routing Protocols

Author image
Thomas Wirtgen

11 min read

Networks change over time, and so do their needs. In response, network operators are constantly improving the services they offer, which often leads to proposals for new features to extend network protocols. To help speed up network innovation, we introduce xBGP, which allows all BGP implementation…

Article tags:

17 Likes are disabled for this article.
2
turkiye_paths

RIPE NCC Internet Country Report: Türkiye

Author image
Suzanne Taylor

3 min read

We take a comprehensive look at the Internet landscape in Türkiye as the next in our series of RIPE NCC Internet Country Reports.

Article tags:

21 Likes are disabled for this article.
0
smart-home

Are IoT Safeguards Keeping Smart Homes Safe?

Author image
Anna Maria Mandalari

3 min read

With IoT devices becoming an increasingly common and convenient addition to our daily lives, we examine whether the safeguards meant to maintain security and privacy when using these devices are actually effective.

Article tags:

49 Likes are disabled for this article.
0
podcast_cover

Wim Vanderbauwhede: Frugal Computing for a Sustainable Internet

Author image
Anastasiya Pak

2 min read

Professor Wim Vanderbauwhede - lead of the Low Carbon and Sustainable Computing activity at the School of Computing Science of the University of Glasgow - talks to us about the carbon footprint of the ICT industry, misleading narratives around digitalisation, and why the notion of frugal computing …

Article tags:

134 Likes are disabled for this article.
1
vulnerability_disclosure

Vulnerability Disclosure: A First-Hand View

Author image
Giovane Moura

9 min read

If exploited, the tsuNAME vulnerability had the potential to overwhelm and bring down authoritative servers, rendering entire DNS zones unreachable. In this article, the SIDN Labs team shares lessons learned along the winding road to public vulnerability disclosure for tsuNAME.

Article tags:

16 Likes are disabled for this article.
2
MENOG 23 Slides Social Media

MENOG 23 - Meeting Report

6 min read

The 23rd edition of the Middle East Network Operating Group (MENOG) was held in Riyadh, Saudi Arabia, as the country accelerates its efforts to become a connection hub for the region and develop its digital economy.

Article tags:

53 Likes are disabled for this article.
0
passkey

How to Secure Your Online Identity with Security Keys

Author image
Kathleen Moriarty

19 min read

Passkeys are appearing more and more in tech news, with support for them increasing. Since many administrators test out new technologies themselves first, we at CIS embarked on a short project to see what happened when an intern with our CTO team had the opportunity to implement passkeys.

Article tags:

15 Likes are disabled for this article.
1
dns

DNSSEC and Zone Transfers: What You Need to Know

Author image
Lars-Johan Liman

8 min read

Everyone knows that signing your DNS zones is a good idea. However, DNSSEC can cause problems when combined with a widely used method for synchronising secondary DNS servers with their primaries, Incremental Zone Transfer (IXFR). Find out why IXFRs are useful and what you need to know to use them t…

Article tags:

25 Likes are disabled for this article.
1
capif 3-3

CAPIF 2 Report - Toward a Stronger Central Asian Internet

Author image
Anastasiya Pak

7 min read

On 19-20 September 2023, the second Central Asia Peering and Interconnection Forum (CAPIF 2) brought together over 200 participants from 19 countries to support regional interconnection and drive Internet growth across Central Asia, Iran, and neighbouring regions.

Article tags:

38 Likes are disabled for this article.
0

Showing 889 article(s)

Previous
1 ... 8 9 10 11 12 ... 89
Next