Banner image

Network Operations

All articles

Where Does Zero Trust Begin and Why is it Important?

Where Does Zero Trust Begin and Why is it Important?

Author image
Kathleen Moriarty

11 min read

In the second of a series of guests posts on information security, Kathleen Moriarty of the Center for Internet Security (CIS) takes a close look at the benefits of zero trust architectures and what their increased adoption means for the industry.

Article tags:

15 Likes are disabled for this article.
0
The State of IPv6 Support on the Tor Network

The State of IPv6 Support on the Tor Network

Author image
Gaba Rodriguez

3 min read

The team behind the Tor Project has been making good on its goal to provide improved IPv6 support on the Tor network. Here's an update!

Article tags:

5 Likes are disabled for this article.
1
Transforming Information Security to Secure Businesses

Transforming Information Security to Secure Businesses

Author image
Kathleen Moriarty

4 min read

In the first of a series of guest posts, Kathleen Moriarty of the Center for Internet Security (CIS) examines five vital trends that are guiding the industry toward better information security.

Article tags:

10 Likes are disabled for this article.
0
Tracking RPKI Repository Performance with a RIPE Atlas Measurement Bundle

Tracking RPKI Repository Performance with a RIPE Atlas Measurement Bundle

Author image
Emile Aben

6 min read

In this post we introduce a wiki to document RIPE Atlas measurements better. We use the measurements we created to track RPKI Repository Performance to show how this is useful.

Article tags:

2 Likes are disabled for this article.
0
Address Assignment Practices in IPv4 and IPv6

Address Assignment Practices in IPv4 and IPv6

Author image
Stephen Strowes

11 min read

In prior work, we've studied IPv4 allocation patterns in domestic ISPs. Time has passed, and IPv6 adoption has continued, so in this article we review our current observations on IPv4 and IPv6 assignment practices.

Article tags:

30 Likes are disabled for this article.
0
Our First Glance at the Uganda Internet Shutdown

Our First Glance at the Uganda Internet Shutdown

Author image
Vesna Manojlovic

3 min read

Reports indicate that the Ugandan government initiated a shutdown of the country's Internet yesterday evening. Here's a look at what we're seeing based on data available from our Routing Information Service (RIS) and RIPE Atlas.

Article tags:

0 Likes are disabled for this article.
1
Moving RPKI Beyond Routing Security

Moving RPKI Beyond Routing Security

Author image
Tim Bruijnzeels

6 min read

Resource Tagged Attestations, or RTAs, are a new type of RPKI object that is being proposed by authors from APNIC and NLnet Labs in the IETF. They allow any arbitrary file to be signed ‘with resources’ by one or more parties.

Article tags:

2 Likes are disabled for this article.
0
Face of Cybersecurity (Ripe Lab)

The Human Face of Cybersecurity

Author image
Youth IGF

4 min read

The Youth IGF is a global movement of young activists, up to the age of 35, who operate as a multi-stakeholder network to lead projects aimed at tackling a wide range of Internet governance issues. In this article, Yuliya Morenets gives an overview of the Youth IGF's recent report on the human face…

Article tags:

2 Likes are disabled for this article.
0
gulf.png

RIPE NCC Internet Country Report: Gulf Region

Author image
Suzanne Taylor

4 min read

We examine the Internet landscape in eight different countries in the Gulf region as the next in our series of RIPE NCC Internet Country Reports.

Article tags:

4 Likes are disabled for this article.
1
Mapping Concentrations of Device Vendors in IXPs

Mapping Concentrations of Device Vendors in IXPs

Author image
Joao M. Ceron

7 min read

Internet exchange points (IXPs) are among the most popular ways for Internet service providers (ISPs) and content distribution networks (CDNs) to exchange traffic. This article gives an analysis of the distribution of vendors chosen by IXP members to connect to IXPs.

Article tags:

3 Likes are disabled for this article.
1

Showing 892 article(s)