security

25 October 2019 at 11:49am
Four years ago, Jisc responded to the Board of European Regulators of Electronic Communications (BEREC) consultation on network neutrality to point out that some security measures cannot just be temporary responses by the victims of attacks, but need to be permanently configured in all networks to prevent them being used for distributed denial of service and other attacks. This applies, in particular, to blocking of spoofed addresses, as recommended by BCP-38.
11 July 2019 at 10:23am
Leonie Tanczer's FIRST 2019 keynote (recording now available on YouTube) looked at more than a decade of European discussions of whether/how to regulate the Internet of Things (no, I didn't realise, either) and how we might do better in future.
11 July 2019 at 10:22am
Merike Kaeo's keynote "Waking Up the Guards" at the FIRST 2019 conference (recording now available on YouTube) highlighted how attacks on the internet core no longer target a single service (naming, routing, signing) but move between these to achieve their hostile result.
12 July 2019 at 4:58pm
Monica Whitty's keynote at the FIRST Conference (recording available on YouTube) used interviews at organisations that had been victims of insider attacks to try to understand these attackers – and possible defences – from a psychological perspective.
21 April 2017 at 1:13pm
The popularity of software-as-a-service (SaaS) applications presents challenges for successful e-mail delivery. The application provider takes on the responsibility for supporting e-mail infrastructure, and as a customer you have a lack of traditional hands-on control of e-mail processing, routing and controls.
16 February 2017 at 3:22pm
Organisations connecting to Janet are required to implement three policies: the Eligibility Policy determines who may be given access to the network; the Security Policy sets out responsibilities for protecting the security of the network and its users; the Acceptable Use Policy identifies a small number of act
31 August 2016 at 2:12pm
The Board of European Regulators of Electronic Communications (BEREC) have now released the final version of their net neutrality guidelines, following a public consultation that received nearly half a million responses. These seem to have resulted in clarifications of the draft version, rather than any significant change of policy.
11 August 2016 at 2:31pm
You may have noticed the quiet appearance of ISO 27001 (and ISO 9001!) logos on our website – a few weeks ago our information security management system was successfully certified against ISO/IEC 27001:2013 for the following Trust and Identity services.
5 July 2016 at 8:32am
A new EU law, created earlier this year, requires public network providers to ensure "network neutrality" – roughly, that every packet be treated alike unless there are legitimate reasons not to.
16 June 2016 at 11:00pm
At the FIRST conference, James Pleger and William MacArthur from RiskIQ described a relatively new technique being used to create DNS domain names for use in phishing, spam, malware and other types of harmful Internet activity. Rather than registering their own domains, perpetrators obtain the usernames and passwords used by legitimate registrants to manage their own domains on registrars' web portals.
Subscribe to security