Network Operations

All articles

Lessons Learned on Improving RPKI

Lessons Learned on Improving RPKI

Nathalie Trenaman

8 min read

“It's fine to celebrate success but it is more important to heed the lessons of failure.” (Bill Gates)

Article tags:

0 You have liked this article 0 times.
6
Blind Trust

Blind Trust

Mirjam Kühne

8 min read

"For well over a decade I have been concerned about the blind trust that exists in the technical world." Merike Kaeo, a global expert in information security, explains why and what we should do about it.

Article tags:

0 You have liked this article 0 times.
0
DNS is Virtually Awesome

DNS is Virtually Awesome

Shane Kerr

5 min read

The RIPE DNS working group will be holding online sessions every few weeks. We have already had the first session, a talk from Kim Davies at PTI/ICANN about some of the challenges of DNSSEC KSK management for the root zone. This session went very well, and we are looking forward to many more in the…

Article tags:

2 You have liked this article 0 times.
0
Easy BGP Monitoring with BGPalerter

Easy BGP Monitoring with BGPalerter

Massimo Candela

9 min read

This is a brief tutorial that explains how to monitor BGP prefixes easily and effectively. For this purpose, we will use an open-source application named BGPalerter which is ready to go and requires almost no configuration. Currently, we use this solution at NTT, one of the largest global providers…

Article tags:

0 You have liked this article 0 times.
2
Post-growth Entrepreneurship

Post-growth Entrepreneurship

Mirjam Kühne

7 min read

"Business is one of the most effective forms of activism. Business is one of the most expressive forms of art." Melanie Rieback, CEO and Co-founder of Radically Open Security, the world’s first not-for-profit computer security consultancy company, explains what she means by this and why post-growth…

Article tags:

12 You have liked this article 0 times.
0
RIPE NCC Country Report: Southeast Europe

RIPE NCC Country Report: Southeast Europe

Suzanne Taylor

3 min read

We examine the Internet landscape in eight different countries in Southeast Europe as the next in our series of RIPE NCC Country Reports.

Article tags:

0 You have liked this article 0 times.
0
The RIPE NCC's Use of Zoom for Meetings

The RIPE NCC's Use of Zoom for Meetings

Kaveh Ranjbar

9 min read

In this article we explain why we will be using Zoom for the upcoming RIPE 80 and RIPE NCC General Meeting, and we outline the policies and settings we have in place to address concerns about privacy and security.

Article tags:

5 You have liked this article 0 times.
8
Validating RPKI Validators

Validating RPKI Validators

Mirjam Kühne

5 min read

In this guest post Drikus Brits describes some results and take-aways from the RPKI Deployathon that took place during APRICOT 2020.

Article tags:

0 You have liked this article 0 times.
2
Ten Requirements for the Evaluation of Contact Tracing Apps

Ten Requirements for the Evaluation of Contact Tracing Apps

Vesna Manojlovic

8 min read

There is an increased interest in the security and privacy impacts of software used for slowing down the spread of the COVID-19 epidemic. In this article, we republish the Chaos Computer Club (CCC) recommendations for your information.

Article tags:

0 You have liked this article 0 times.
3
What COVID-19 Means for Network Security

What COVID-19 Means for Network Security

Gary Stevens

4 min read

In this article, we’ll take a look at ways that the pandemic is changing network security.

Article tags:

0 You have liked this article 0 times.
0

Showing 868 article(s)