Basics of RPZ

Using the DNS Resolver to Protect Networks

Smart organizations use the DNS Resolver to Protect Networks.  Here is why …   A typical story ….. Imagine walking in to work the first thing in the morning. Your staff comes into the office. They get their coffee, fire up their computer, and check out the morning industry news. Your staff is alert, applies Read More

RTBH as a DOS Mitigation Tool

Remote Triggered Black Hole (RTBH) Filtering

  RTBH Fundamentals You have three choices when you stand in front of an on rushing force. You can push back directly against that force. You can step aside and let the force push past you. Or, you can redirect the force to a location that you choose. Now think of that “force” in the Read More

Linkedin - In

Building and Investing in a Community of “Contacts”

Building and Investing in a Community of “Contacts.” We’re a world of people. People in communities. Communities that only work if people within that community invest in building, Foster, interconnect, and serve the individuals in that community. The community only grows with healthy investment and welcoming culture. All these factors are essential to taking a Read More


Demand Security from your Vendors

Demande Security from your Vendors. Ask the right “Security Questions.” This provides a list of questions that anyone can use with their vendors to get a better understanding of their security capabilities. Start meaningful “Security Conversations.”


The Practical Security Checklist – Part 2.1

This is part “2.1” of a multipart post to help organizations take security action. Stay tuned for next week’s practical security checklist item. Board members, CxOs, and professionals are saturated with security advice. This security advice is often confusing, contradictory, and always biased toward “buying something.” “Good security advice saturation” results in paralysis of action. Read More

Force of Nature

Are you ready for the next attack? (Part 1)

Are you ready for the next attack? As many of my colleagues know, I’m constantly on the look out for tools that would help my peers in all networks find ways to mitigate the security risk in their operations. At MYNOG 5 ( I reviewed the latest tool, a checklist operators can use to prepare Read More


Adding IPv6 Requirements to your RFP

[ Originally posted on Linkedin here: IPv6 – Adding Requirements to your RFP. Adding IPv6 Requirements to your RPF is a necessity when all the major Google, Facebook, Linkedin, and other sites are built for “IPv6” first. Meaningful IPv6 requirements in RFPs are a core tool to your dialog with your vendors. This is a Read More


Don’t wait, prepare for the Internet Skills Gap

I’m grateful to my peers who spent the time to have coffee over this past week. We all see big changes in the industry and are really worried about the skills needed to capitalize on these changes. What follows are some thoughts that might be useful as we all explore how we can bridge the Read More


Get the Right People on the Bus and Finding Staff with that Internet Spirit

How do you find the people with the Internet Spirit? How do you ‘get the right people on the bus?’ Top Telecom Companies need people who are can ride the wave of change. Long live the Internet. The Internet Model now dominates all of telecommunications. The Internet’s End-to-End Model puts customers first. It is a Read More