Network Operations

All articles

RIPE NCC Information Security Controls Framework For Cloud Services

Ivo Dijkhuis

Information security controls help protect against vulnerabilities and risk. In this article, we share details of the RIPE NCC Cloud Security Controls Framework that we'll be using to assess whether cloud providers meet the security requirements for our services.

Article tags:

31 You have liked this article 0 times.
0

PeeringDB 2021 Product Report

Leo Vegoda

Data quality was ranked most important by respondents to PeeringDB's 2020 and 2021 user surveys. This update focuses on several improvements we've made to improve the quality of data going into PeeringDB and help users get precisely what they want out of it.

Article tags:

6 You have liked this article 0 times.
0

Authentication and Authorisation Using Single Sign-On

Kathleen Moriarty

To prevent attacks, there's a push for multi-factor authentication. This is a vital step and should be considered if your organisation hasn't yet made the transition. But while MFA adds protections, how you implement single sign-on, authorisation, and/or federation requires consideration.

Article tags:

12 You have liked this article 0 times.
0

RIPE NCC Internet Country Report: Cyprus, Israel and Malta

Suzanne Taylor

We take a comprehensive look at three different countries in the Mediterranean region as the next in our series of RIPE NCC Internet Country Reports.

Article tags:

40 You have liked this article 0 times.
1

DNS Openness

Geoff Huston

Is the DNS open? And would its being open count as a strength or a weakness? These questions lie at the heart of discussions about the future of the Internet, but to answer them, first you have to ask what 'openness' amounts to when it comes to DNS.

Article tags:

68 You have liked this article 0 times.
0

Why Are Authentication and Authorisation So Difficult?

Kathleen Moriarty

Let’s say you’re tasked with selecting a strong authentication solution for your organisation. Where do you begin? This article is the first of a series that will explore authentication and authorisation technologies in the context of recent exploits and developing trends.

Article tags:

14 You have liked this article 0 times.
0

Micro BGP Suite: The Swiss Army Knife of Routing Analysis

Lorenzo Cogotti

BGP Scanner from the Isolario project helped researchers analyse routing data, but it had its limitations. Overcoming these has led to the development of the Micro BGP Suite. It provides a variety of tools that, while each simple and efficient in their own operations, are capable of achieving compl…

Article tags:

12 You have liked this article 0 times.
0

NIS 2 (and the other EU regulation updates you need to know): November 2021

Suzanne Taylor

This is the latest in an ongoing series in which we give a brief overview of the most pertinent digital policies currently being proposed, debated and implemented in the European Union.

Article tags:

32 You have liked this article 0 times.
0

Should You Update Your Route Flap Damping Parameters?

Clemens Mosig

BGP Route Flap Damping (RFD) is recommended to suppress BGP churn. Default RFD configurations in routers have been shown to be harmful. Current configuration recommendations by the IETF and RIPE, however, are based on a study from 2010 which focused on IPv4 only. This article presents our recent me…

Article tags:

14 You have liked this article 0 times.
0

Showing 719 article(s)