DirectionThreats.png

Filtering Exploitable Ports and Minimizing Risk to and from Your Customers

What are you doing to prepare for the next “scanning malware” and “Internet Worm?” Barry Greene @ bgreene@senki.org Version 1.0 TLP:WHITE Recommendation: Operators (CSPs, ISPs, Cloud Companies, and Hosting Companies) are strongly encouraged to deploy Port Filtering on the known Exploitable ports and Source Address Validation (SAV) on their customer edge of the network as Read More

bcp38_small

Everyone should be deploying BCP 38! Wait, they are ….

Have you deployed BCP 38 in your network? For most networks, the answer is yes. During last week’s FCC CSRIC III meeting, several people called on operators to deploy “BCP 38.” This IETF best common practice (BCP) is packet filter placed on the edge of networks to insure that the IP source cannot pretend to Read More