Andrew Campling is Director of 419 Consulting, a public policy and public affairs consultancy focused on the tech and telecom sectors. He has nearly forty years of experience in a wide range of increasingly senior roles in a mainly business-to-business technology context, together with over a decade of non-executive experience. He is currently engaged in a number of initiatives linked to encrypted DNS and related developments.
This article provides an update on developments in encrypted DNS and related protocols and their potential impact on cybersecurity. In particular, it highlights how applications are making it increasingly difficult for both enterprises and consumers to monitor their in-bound and out-bound communica…
Leo Vegoda is PeeringDB’s Product Manager. He was previously responsible for organizational planning and improvement in ICANN’s Office of the COO, and Internet Number Resources in the IANA department, as well as running Registration Services at the RIPE NCC.
PeeringDB wants input from everyone who uses our interconnection database. Our anonymous survey is now open until 23:59 UTC on 16 October 2022. We would like your feedback to help us make PeeringDB more useful to everyone involved in connecting networks.
Thijs van den Hout is a research engineer at SIDN Labs, the R&D department of the .nl ccTLD registry. He has a Master's degree in Artificial Intelligence. His focus is the application of machine learning techniques to increase the safety of the internet, for example through abuse detection.
Over the past months, SIDN Labs have been improving the testbed they developed for the DDoS Clearing House. At the CONCORDIA Open Door event (COD2022) this October, they'll demonstrate how the testbed works as part of the CONCORDIA Threat Intelligence Platform. The team look at the latest changes t…
Flavio Luciani was born in Rome in 1981 and graduated in Computer Engineering from the University of Roma Tre in 2005. Since 2008 he has been in the team of Namex, the Internet eXchange Point in Rome, first as a member of the technical staff and since 2020 as Chief Technology Officer. He is currently involved in several initiatives in the Internet Community: he collaborates with the RIPE NCC organisation, with the association of European eXchange points EURO-IX and holds a role in the Steering Committee, within the Internet Society (ISOC) initiative, Mutually Agreed Norms for Routing Security. Through workshops, courses and in-depth articles, it promotes greater attention to the topic of routing security.
For the first time in Italy, a major event - the Serie A football championship - is being broadcast exclusively via the Internet. In this article, we share some considerations the phenomenon of streaming football in Italy, looking at things from the operator’s point of view
Koen van Hove is a researcher at the University of Twente on the topic of network security, with a focus on DoS-risks. His most notable contributions are to the DDoS Clearing House and RPKI Relying Party Resiliency Platform.
Merely doing RPKI ROV does not provide any guarantees where your packet ends up. We conducted an experiment where we look into the impact of RPKI ROV on whether the packet ends up in the intended location based on active beaconing with two servers.
Fredrik is currently working at Netnod as a Security Expert in the Security Engineering team. His role is focused on internal processes, public policy development and the implications of policy on Netnod’s services.
In 2021, Fredrik defended his PhD-thesis, Coordinating the Internet: Thought styles, technology and coordination. Prior to that, he worked as a systems engineer in the financial services sector with a focus on systems integration and replacement of dedicated communications networks and services for financial services over the Internet.
Fredrik has a PhD in Industrial Engineering and Management with specialisation in Economic Information Systems and an MSc in Computer Science and Engineering.
A chain is not as strong as its weakest link, it can be much much stronger. In cybersecurity, the art of building secure systems from insecure but diverse components is an important but often neglected topic. Instead, processes, rigidity and structure are generally seen as the only way to attain se…