BGP Hijacking News, Blogs, and References Articles

There is a lot of BGP Hijacking News in the press. It is one of those “controversial” and “exciting” news items. It is always useful to read through the blogs, news, and articles about the incident. The following is a list. The object is to build a list “BGP Hijacking Risk Justifications.” These “Risk Justifications” Read More

7 Critical Security Conversations

The wave of supply chain security conversations that was sparked by the Bloomberg articles has people talking (see The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies and related articles). The increased interest in supply chain security is important. It is feasible for threat-actors sneak in a backdoor, exploitable code, or Read More

Master Class in Internet Networking …. Free

Nick Feamster Provides Operators, Engineers, and Students with the Tools to Understand How the Internet is Glued Together Who is Nick Feamster? Dr. Nick Feamster is known in the Internet Operations community as one of our primary source of great talent, research that pushes the Industry forward, a deep-dive investigation into security issues on the Read More

Hardware & Software Vulnerabilities are Guaranteed

The long years of experience have taught me through experience, hardware & software vulnerabilities are guaranteed. It is not a matter of “if” but when. The sad reality is that most hardware and software vendors are not ready for vulnerabilities when they happen. Their response ranges from “I’m going to take legal suit” against the Read More

Are your customers infected with VPNFilter?

Everyone is talking about VPNFilter, but there is little information to know if my customers, my staff, or my own home is at risk? How do can I get plugged in? Understanding if you are at risk would be helpful to know if you need to drop everything and fix it now, fix it this Read More

I’ve got an exciting opportunity for you ….

“I’ve got an exciting opportunity for you …” “We’re looking for a security architect …” “Would you be interested in this security role …” Thank you for reaching out and offering an “opportunity.”  It is a fact that we’re never going to have enough security professionals. The problem will grow. People with 1-3 years security Read More

Using the DNS Resolver to Protect Networks

Smart organizations use the DNS Resolver to Protect Networks.  Here is why …   A typical story ….. Imagine walking in to work the first thing in the morning. Your staff comes into the office. They get their coffee, fire up their computer, and check out the morning industry news. Your staff is alert, applies Read More

Remote Triggered Black Hole (RTBH) Filtering

  RTBH Fundamentals You have three choices when you stand in front of an on rushing force. You can push back directly against that force. You can step aside and let the force push past you. Or, you can redirect the force to a location that you choose. Now think of that “force” in the Read More

Building and Investing in a Community of “Contacts”

Building and Investing in a Community of “Contacts.” We’re a world of people. People in communities. Communities that only work if people within that community invest in building, Foster, interconnect, and serve the individuals in that community. The community only grows with healthy investment and welcoming culture. All these factors are essential to taking a Read More

About Senki

SENKI is the indomitable spirit in Japanese (it can also be referred to war spirit). SENKI is the personal Blog space of Barry Raveendran Greene. I use it to share views and thoughts on areas of my work related to the scaling of the Internet. The theme and topics are around scaling (people and the Internet) Read More