RIPE NCC

All articles

The Global Digital Compact: Unpacking the RIPE NCC’s Contribution

The Global Digital Compact: Unpacking the RIPE NCC’s Contribution

Claudia Leopardi

9 min read

The Global Digital Compact: What is it? Why are we concerned? As part of her internship with the RIPE NCC's Public Policy and Internet governance team, Claudia Leopardi discusses the RIPE NCC’s contribution to this important UN process.

Article tags:

37 You have liked this article 0 times.
0
Pushing the Needle Forward - A Community Engagement Quarterly Report

Pushing the Needle Forward - A Community Engagement Quarterly Report

Hisham Ibrahim

11 min read

At the RIPE NCC, we tailor our engagement to the needs and abilities of each part of the community - all with the aim of making a meaningful impact on the Internet ecosystem. In this first in a series of quarterly reports, I look at the work we do in community engagement and how we measure outcomes…

Article tags:

39 You have liked this article 0 times.
4
More Next Steps in IPv6 Policy Work

More Next Steps in IPv6 Policy Work

Leo Vegoda

3 min read

The RIPE Address Policy Working Group is organising interim sessions to plan IPv6 policy discussions at RIPE 86 in Rotterdam. The purpose of these sessions is not to develop policy proposals. It is to define desired policy outcomes and set priorities.

Article tags:

3 You have liked this article 0 times.
0
Cyber Resilience, "Fair Share", and Sanctions - Our Regulation Update April 2023

Cyber Resilience, "Fair Share", and Sanctions - Our Regulation Update April 2023

Suzanne Taylor

14 min read

This is the latest in an ongoing series in which we give a brief overview of the most pertinent digital policies for the RIPE community currently being proposed, debated and implemented in the European Union.

Article tags:

21 You have liked this article 0 times.
0
SAV: Why Is Source Address Validation Still a Problem?

SAV: Why Is Source Address Validation Still a Problem?

Qasim Lone

13 min read

Despite being a known vulnerability for at least 25 years, source IP address spoofing remains a popular attack method for redirection, amplification and anonymity. Preventing these attacks requires that operators implement Source Address Validation (SAV) to ensure their networks filter packets with…

Article tags:

34 You have liked this article 0 times.
3
Community Development Plans for 2023

Community Development Plans for 2023

Gergana Petrova

11 min read

The RIPE community and other regional and national communities within our service region face unique circumstances and different challenges. The Community Development department at RIPE NCC is there to serve and help these communities. In this article, we share what we did in 2022 and our plans for…

Article tags:

30 You have liked this article 0 times.
0
Opinion: IP Leasing Should Become a Market Standard

Opinion: IP Leasing Should Become a Market Standard

Vincentas Grinius

8 min read

The policy of the Asia-Pacific Regional Internet Registry (APNIC) that does not accept IP leasing has been questioned during its recent meeting in conjunction with APRICOT. While each of the five global RIRs has its own policies regarding IP leasing, this opinion piece argues that the APNIC policy …

Article tags:

16 You have liked this article 0 times.
0
Next Steps in IPv6 Policy Work

Next Steps in IPv6 Policy Work

Leo Vegoda

2 min read

The RIPE Address Policy Working Group is organising interim sessions to plan IPv6 policy discussions at RIPE 86 in Rotterdam. The purpose of these sessions is not to develop policy proposals. It is to define desired policy outcomes and set priorities.

Article tags:

4 You have liked this article 0 times.
0
IPv6 Policy Is a Community Self-Governance Success Story

IPv6 Policy Is a Community Self-Governance Success Story

Leo Vegoda

6 min read

IPv6 policy has gone through many refinements since it was first adopted by the RIRs 20 years ago. Is it time for a more significant change? Join the RIPE Address Policy Working Group in conversation on the next phase of IPv6 policy.

Article tags:

32 You have liked this article 0 times.
0
Top 3 Types of IP Address Abuse That Threaten IPv4 Resource Holders

Top 3 Types of IP Address Abuse That Threaten IPv4 Resource Holders

Vincentas Grinius

7 min read

Since the exhaustion of the IPv4 address pool, companies across the globe heavily rely on IPv4 transfer and lease markets. Unfortunately, transferred IP address blocks are far more likely to be blocklisted due to IP address abuse. But while abuse negatively affects IP address reputation, the risks …

Article tags:

27 You have liked this article 0 times.
0

Showing 282 article(s)