A Deep Dive on the Recent Widespread DNS…

Read Brian’s article then look for Akamai’s Blog ‘PROTECTING YOUR DOMAIN NAMES: TAKING THE FIRST STEPS’ for understandable actions to protect your domain. @briankrebs #DNS #cybersecurity A Deep Dive on the Recent Widespread DNS… The details around the recent widespread DNS hijacking attacks have remained shrouded in secrecy. Find out more: Akamai Dynamic Signal Read More

Security Collaboration – How do you Start?

We see weekly post, pontifications, announces, and proclamations about the need for greater security collaboration. Many times, the organizations and groups who are posting these “aspirations” fail to take the collaboration to the next step. They are not sure how to break into productive security collaboration. In the security community, “productive security collaboration” is built Read More

5G Latency – Reality Checks

The industry is flooded with a lot of “5G will save the planet” without doing the homework to understand what is going on. It is shocking to see disinformation statements that “5G is expected to slash data transmission delays from about 30 milliseconds to less than one.” Yes! 5G defines the law of physics! 5G Read More

BGP Hijacking News, Blogs, and References Articles

Why Review BGP Hijacking News?  There is a lot of BGP Hijacking and routing mistakes covered by in the press. It is one of those “controversial” and “exciting” news items. BGP routing incidents (intentional and unintentional) are great press because they have risk imposed on all telecommunications which at times is outside of the control

7 Critical Security Conversations

The wave of supply chain security conversations that was sparked by the Bloomberg articles has people talking (see The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies and related articles). The increased interest in supply chain security is important. It is feasible for threat-actors sneak in a backdoor, exploitable code, or Read More

Master Class in Internet Networking …. Free

Nick Feamster Provides Operators, Engineers, and Students with the Tools to Understand How the Internet is Glued Together Who is Nick Feamster? Dr. Nick Feamster is known in the Internet Operations community as one of our primary source of great talent, research that pushes the Industry forward, a deep-dive investigation into security issues on the Read More

Hardware & Software Vulnerabilities are Guaranteed

The long years of experience have taught me through experience, hardware & software vulnerabilities are guaranteed. It is not a matter of “if” but when. The sad reality is that most hardware and software vendors are not ready for vulnerabilities when they happen. Their response ranges from “I’m going to take legal suit” against the Read More

Are your customers infected with VPNFilter?

Everyone is talking about VPNFilter, but there is little information to know if my customers, my staff, or my own home is at risk? How do can I get plugged in? Understanding if you are at risk would be helpful to know if you need to drop everything and fix it now, fix it this Read More

I’ve got an exciting opportunity for you ….

“I’ve got an exciting opportunity for you …” “We’re looking for a security architect …” “Would you be interested in this security role …” Thank you for reaching out and offering an “opportunity.”  It is a fact that we’re never going to have enough security professionals. The problem will grow. People with 1-3 years security

Using the DNS Resolver to Protect Networks

Smart organizations use the DNS Resolver to Protect Networks.  Here is why …   A typical story ….. Imagine walking in to work the first thing in the morning. Your staff comes into the office. They get their coffee, fire up their computer, and check out the morning industry news. Your staff is alert, applies Read More