Lithuania warns that China has ramped up espionage & cyber campaigns in this year’s National Threat Assessments. Cybersecurity and Digital Safety specialists benefit from studying and reflecting on other countries’ national threat assessments. The problem is selecting one that best matches the resources and capabilities that are more closely aligned with most of the world. You cannot compete with the resources from the Five Eye Countries (Aotearoa/New Zealand, Australia, Canada, United… Read More
Category: Uncategorized
If I say it over an over again, it must be true …
“Keeping to your message, repeat it many times, and ignore the criticism” are key principles of success in Washington DC policy work. If you say something over and over again, it must be true. It does not matter if the message is true, based on facts, or have any empirical data to support your assertion. Read More
SLA as a Security Tool
IPPM IP Performance Metrics (ippm) Ippm Status Pages NANOG: Tutorial Abstract: Deploying Tight-SLA Services on an Internet Backbone – ISIS Fast Convergence and Differentiated Services Design IPPM & SLA Papers Accurate and Efficient SLA Compliance Monitoring IPPM & SLA Books Supporting Service Level Agreements on IP Networks By Dinesh Verma
SP Security Empowerment Materials
SP Security Empowerment Materials DRAFT 2.0 The following materials will help SPs, Hosting Centers, and Operators of any large network get details on a wide range of SP Security techniques. Many of these techniques are taking advantage of technologies that already exist in the network – it just takes a bit of time to empower