Banner image

Network Operations

All articles

U2F Hardware Authentication Security Keys, Tony Webster, CC BY 2.0

PeeringDB to Require MFA and API Keys

Author image
Leo Vegoda

2 min read

You must have a second factor to login to PeeringDB from 1 July 2025. If you automate updates using our API, you'll need to use an API Key. But anonymous usage will not be going away. You can query the website or API without authenticating. This change will impact users who make updates or need acc…

Article tags:

37 Please read the article before liking.
0
ipv6

Routing IPv6 Through Wireguard With MikroTik and Debian

Author image
Wido den Hollander

5 min read

With a recently allocated /29 subnet, a new RIPE NCC member set himself the challenge of routing parts of this IPv6 space to his home. The result? An IPv6-only setup with pure plain routing!

Article tags:

18 Please read the article before liking.
0
phishing_tests_cover

Phishing Tests: Are We Doing This Right?

Author image
Kathleen Moriarty

4 min read

Phishing tests are a common cybersecurity practice, but do they truly prepare employees for real-world threats? In some cases, these tests can inadvertently create a false sense of security or even undermine existing security controls.

Article tags:

32 Please read the article before liking.
0
digital_hub_ixp

Building a Secure Test Environment for an IXP

Author image
Marta Burocchi

10 min read

IXPs operate on principles of trust and cooperation upheld through adherence to clear rules. Quarantine VLAN is a way to help test whether new peers are compliant with those rules. Namex Digital Twin now enables Namex members to carry out these tests for themselves.

Article tags:

53 Please read the article before liking.
0
1080x1080px_01_v03_Ripe-Labs-podcast_E-01 (2)

Francesca Bosco: Who Governs Cyberspace?

Author image
Anastasiya Pak

2 min read

In this episode, we dive into the evolving world of cyberspace and international cybersecurity law with Francesca Bosco from the CyberPeace Institute. Unpacking the evolving definition of cyberspace, the latest in international cybersecurity legislation, and its potential impact on civil society, F…

Article tags:

35 Please read the article before liking.
0
Green Internet

Why Small and Medium-Size Operators Should Care About Sustainability

Author image
Michael Oghia

3 min read

A new resource dedicated to small and medium-sized digital infrastructure providers in Europe highlights the benefits of incorporating sustainability into their operations, offers a consolidated list of best practices and recommendations, and shares additional resources to help them make practical …

Article tags:

59 Please read the article before liking.
7
RPKI

RPKI's 2024 Year in Review

Author image
Job Snijders

7 min read

Having just closed the book on another orbit around the sun - let's look back at how RPKI did in 2024! In this memo I'll share some RPKI statistics, summarise highlights from the IETF Standards Development process, and reflect on emerging trends.

Article tags:

35 Please read the article before liking.
0
mapping_peak

Namex Steps Into the Terabit Era

Author image
Flavio Luciani

7 min read

On 15 January, Namex reached a historic milestone: the first terabit of Internet network traffic, marking the beginning of a new chapter in its growth story. Coinciding with the broadcast of the Inter-Bologna football match by DAZN, the event highlighted the growing importance of live streaming for…

Article tags:

26 Please read the article before liking.
0
igf_24_cover

IGF 2024 Report

Author image
Ulka Athale

8 min read

The RIPE NCC team was at the 19th Internet Governance Forum held in Riyadh, Saudi Arabia. Here are some of our key takeaways from the last Internet event of 2024!

Article tags:

22 Please read the article before liking.
2
image1

MENOG 24 - Meeting Report

Author image
Kjerstin Burdiek

5 min read

The 24th edition of the Middle East Network Operators' Group (MENOG) and Peering Forum was held in Muscat, Oman, as the region continues to enhance its digital presence through better peering, stronger security and more effective regulations.

Article tags:

21 Please read the article before liking.
0

Showing 905 article(s)