Banner image

Network Operations

All articles

Trusted Assurance Simplified

Trusted Assurance Simplified

Author image
Kathleen Moriarty

5 min read

In the third of this series of guest posts, Kathleen Moriarty talks about the importance of posture assessment - the process of evaluating organisation or system security - and looks at solutions for simplifying that process that could help organisations achieve higher levels of trusted assurance.

Article tags:

13 Likes are disabled for this article.
0
new_dot.png

Measuring DNS over TLS from the Edge: Adoption, Reliability and Response Times

Author image
Trinh Viet Doan

9 min read

DNS over TLS (DoT) is an extension to the DNS over UDP/53 (Do53) protocol, which provides additional confidentiality to the DNS messages between client and server. Since its standardisation in RFC7858 in 2016, DoT has gained increasing support by various DNS services as well as operating systems. …

Article tags:

28 Likes are disabled for this article.
0
Trufflehunter: A New Tool to Sniff Out DNS Usage

Trufflehunter: A New Tool to Sniff Out DNS Usage

Author image
Audrey Randall

4 min read

Measuring domain usage on centralised public DNS resolvers can be very useful, but it's also pretty hard to do. Trufflehunter is a new open source tool that puts snooping techniques to good use in order to accurately estimate the popularity of domains.

Article tags:

19 Likes are disabled for this article.
0
Screenshot 2021-04-12 at 18.05.01.png

The PeeringDB Survey 2020 - Results and Roadmap

Author image
Leo Vegoda

3 min read

With the results of the PeeringDB survey 2020 gathered and analysed, Leo Vegoda takes a look at how your feedback has helped the team build their roadmap for 2021.

Article tags:

1 Likes are disabled for this article.
0
Where Does Zero Trust Begin and Why is it Important?

Where Does Zero Trust Begin and Why is it Important?

Author image
Kathleen Moriarty

11 min read

In the second of a series of guests posts on information security, Kathleen Moriarty of the Center for Internet Security (CIS) takes a close look at the benefits of zero trust architectures and what their increased adoption means for the industry.

Article tags:

15 Likes are disabled for this article.
0
The State of IPv6 Support on the Tor Network

The State of IPv6 Support on the Tor Network

Author image
Gaba Rodriguez

3 min read

The team behind the Tor Project has been making good on its goal to provide improved IPv6 support on the Tor network. Here's an update!

Article tags:

5 Likes are disabled for this article.
1
Transforming Information Security to Secure Businesses

Transforming Information Security to Secure Businesses

Author image
Kathleen Moriarty

4 min read

In the first of a series of guest posts, Kathleen Moriarty of the Center for Internet Security (CIS) examines five vital trends that are guiding the industry toward better information security.

Article tags:

10 Likes are disabled for this article.
0
Tracking RPKI Repository Performance with a RIPE Atlas Measurement Bundle

Tracking RPKI Repository Performance with a RIPE Atlas Measurement Bundle

Author image
Emile Aben

6 min read

In this post we introduce a wiki to document RIPE Atlas measurements better. We use the measurements we created to track RPKI Repository Performance to show how this is useful.

Article tags:

2 Likes are disabled for this article.
0
Address Assignment Practices in IPv4 and IPv6

Address Assignment Practices in IPv4 and IPv6

Author image
Stephen Strowes

11 min read

In prior work, we've studied IPv4 allocation patterns in domestic ISPs. Time has passed, and IPv6 adoption has continued, so in this article we review our current observations on IPv4 and IPv6 assignment practices.

Article tags:

30 Likes are disabled for this article.
0
Our First Glance at the Uganda Internet Shutdown

Our First Glance at the Uganda Internet Shutdown

Author image
Vesna Manojlovic

3 min read

Reports indicate that the Ugandan government initiated a shutdown of the country's Internet yesterday evening. Here's a look at what we're seeing based on data available from our Routing Information Service (RIS) and RIPE Atlas.

Article tags:

0 Likes are disabled for this article.
1

Showing 896 article(s)