In a recently published Uptime Institute Survey, Uptime Institute found that organizations operating data centers are finding it increasingly difficult to recruit professionals skilled in security, networking, and hybrid technologies. This realization comes at an interesting time, as the monolithic business infrastructure built over the last two decades is now entering a period of transformation. more
During the 27th Usenix Security Symposium held in Baltimore, MD last week, a group of researchers from China revealed results obtained from a large-scale analysis DNS interceptions. more
The eighth RIPE NCC hackathon takes on the Quantum Internet! The hackathon will be held during the weekend before RIPE 77 in Amsterdam, and is co-organised by QuTech and TU Delft, along with the RIPE NCC. We're bringing together network operators, quantum networking researchers, students, hackers, software developers and artists, to imagine and build the tools for the future Internet. more
Tech is commoditizing. I've talked about this before; I think networking is commoditizing at the device level, and the days of appliance-based networking are behind us. But are networks themselves a commodity? Not any more than any other system. We are running out of useful features, so vendors are losing feature differentiation. This one is going to take a little longer... more
Report describes a technique with which public wifi can be used to identify in-baggage dangerous objects in public spaces that don't typically have affordable screening options. more
"The latest development in Yemen's long-running civil war is playing out in the global routing table," Doug Madory reports in a blog post today from Oracle's Internet Intelligence unit. more
One way or another we've been working on various aspects of securing the Internet's inter-domain routing system for many years. I recall presentations dating back to the late '90's that point vaguely to using some form of a digital signature on BGP updates that would allow a BGP speaker to assure themselves as to the veracity of a route advertisement. more
A lengthy email to the NANOG mailing list last month concerning suspicious routing activities of a company called Bitcanal initiated a concerted effort to kick a bad actor off the Internet. more
Is the recently announced Cisco Networking Academy at the Universidad de Ciencias Informáticas a belated drop in the bucket or the first step in a significant opening? Cisco dominated the infrastructure equipment market in Cuba and elsewhere during the early days of the Internet, but Huawei replaced them in Cuba... What does this mean? It might be a belated drop in the bucket. UCI has only 19 trained CNA instructors while the CNA curriculum is being taught by over 20,000 instructors at over 10,000 institutions. more
Ten years ago, I wrote an article that looked back on the developments within the Internet over the period from 1998 to 2008. Well, another ten years have gone by, and it's a good opportunity to take a little time once more to muse over what's new, what's old and what's been forgotten in another decade of the Internet's evolution... The evolutionary path of any technology can often take strange and unanticipated turns and twists. more
Oracle today announced the launch of the Internet Intelligence Map website; a source available for free that provides country-level connectivity statistics based on traceroutes, BGP, and DNS query volumes on a single dashboard. more
The two lawsuits filed by the Russian software firm Kaspersky Lab against the U.S. government banning federal networks from using the company's anti-virus software was dismissed on Wednesday by a federal judge. more
The law set by U.S. Government for all agencies to fully remove the controversial Russian based Kaspersky Lab security software by October is proving a lot harder than anticipated. more
Cisco's security arm, Talos, today revealed a several-month-old research on a sophisticated modular malware system dubbed "VPNFilter. more
A new type of DDoS attack takes advantage of an old vulnerability with the potential to put any company with an online presence at risk of attack warn researchers. more