FAQ – Which Shadowserver Reports list CVEs? Many people frequently ask how Shadowserver includes CVEs (Common Vulnerabilities and Exposures) in its reports. Currently, there are over 140 reports published, with more on the way. The Shadowserver Alliance is active, working together to support the Shadowserver initiative and develop new report types. It’s a logical question to ask. The wonders of today make it soooo easy to find answers. You don’t need to ask gurus to kick-start your journey…. Read More
Category: Uncategorized
Lithuania provides inside into the broader threats from China
Lithuania warns that China has ramped up espionage & cyber campaigns in this year’s National Threat Assessments. Cybersecurity and Digital Safety specialists benefit from studying and reflecting on other countries’ national threat assessments. The problem is selecting one that best matches the resources and capabilities that are more closely aligned with most of the world. You cannot compete with the resources from the Five Eye Countries (Aotearoa/New Zealand, Australia, Canada, United… Read More
If I say it over an over again, it must be true …
“Keeping to your message, repeat it many times, and ignore the criticism” are key principles of success in Washington DC policy work. If you say something over and over again, it must be true. It does not matter if the message is true, based on facts, or have any empirical data to support your assertion. Read More
SLA as a Security Tool
IPPM IP Performance Metrics (ippm) Ippm Status Pages NANOG: Tutorial Abstract: Deploying Tight-SLA Services on an Internet Backbone – ISIS Fast Convergence and Differentiated Services Design IPPM & SLA Papers Accurate and Efficient SLA Compliance Monitoring IPPM & SLA Books Supporting Service Level Agreements on IP Networks By Dinesh Verma
SP Security Empowerment Materials
SP Security Empowerment Materials DRAFT 2.0 The following materials will help SPs, Hosting Centers, and Operators of any large network get details on a wide range of SP Security techniques. Many of these techniques are taking advantage of technologies that already exist in the network – it just takes a bit of time to empower