News

Blog posts represent the views of CFR fellows and staff and not those of CFR, which takes no institutional positions. Justin Sherman (@jshermcyber) is a fellow at the Atlantic Council’s Cyber ...
Because of their robust reliability, security and flexibility, voice over Internet protocol solutions are being adapted by the military worldwide. Voice technologies evolve for tomorrow’s military ...
Austin, TX – September 26, 2000 – Motorola unveiled itsSecurity technology with the announcement of a family of security processors. Motorola is broadening its Smart Networks Platform offerings in the ...
Networks new to IPv6 lack maturity in IPv6 configurations and tools, and dual-stacked networks, which run on IPv4 and IPv6 simultaneously, have an increased attack surface. Employees working on ...
Moe enjoys making technical content digestible and fun. As a writer and editor for over a decade, he has bylines at MakeUseOf, WhistleOut, TechBeacon, DZone, Tech Up Your Life, and Electromaker. When ...
The IPv6 protocol affects the security of your network even if you haven't deployed it internally. Here are the most important points every security team needs to understand about the protocol. If you ...
An aging core internet protocol is finally getting the ax by Microsoft Corp. But it wasn’t just last month’s announcement that the software vendor was ending support for versions 1.0 and 1.1 of ...
The 60th meeting of the Asia Pacific Network Information Center (APNIC 60) opened in the central city of Da Nang on September ...
Pascal Geenens of Radware discusses the emerging Internet of Agents, the technologies driving it, and the new cybersecurity challenges it creates. The Internet of Agents is taking shape with ...
The Federal Communications Commission is taking another step into the world of cybersecurity, teeing up a rule aimed at bolstering the security posture of a crucial worldwide data routing framework.