No, most ASEAN countries are not ready for “serious cybersecurity.” Cybersecurity requires a persistent and consistent rhythm of action that fixes known security risks. Public benefit—non-profit cyber civil defense organizations like the Shadowserver Foundation, CyberGreen, and other organizations deliver actionable cyber-risk reporting as a public benefit. Yes, these reports are free to organizations seeking to Read More
Category: Conferences, Webinars, & Workshops
This category is used to find all the conference talks, presentations, workshops, and other materials shared throughout the community.
Cyber Civil Defense – Leveraging Shadowserver’s Capabilities & Capacity
Cyber Civil Defense – Leveraging Shadowserver’s Capabilities & Capacity – Shadowserver Briefing, Optimization, and Updates Shadowserver’s Public Benefit Mission has not changed! Our mission is to make the Internet more secure by bringing to light vulnerabilities, malicious activity, and emerging threats. We promote a culture of sharing, equip organizations to improve their security, support criminal
Posting on Senki
External posting is not allowed on Senki. Senki is the personal outreach to a specialized and curated community that focuses on the security, resiliency, and growth of what people now call the Internet. The materials, thoughts, views, recommendations, guidelines, observations, and calls to action are Trusted. The Trust is curated through the community activities in
Beyond “Security Architecture” – It is all about Business Resiliency
“Security Architecture” is the theme Mathew J. Schwartz (ISMG) pulled out of his interview with John Chambers, founder, and CEO of JC2 Ventures. It is ironic that on a “life-impacting day,” in pop an interview from one of my mentors, John Chambers. If you are reading this, stop and listen to the interview. Once you’ve Read More
Welcome to CyberWar & LongTerm Ramification Unleashed by Russia’s War
Cyberwar is today’s reality. We’ve moved from a world of cyber-criminal threats to an interconnected arena where any malicious activity is feasible. Cyber-Kinetic attacks that destroy, kill, and massively disrupt civil society are part of our new security threat landscape reality. Geography will not help. The massively interconnected Internet means that you are a cyberwarrior’s
IP Anti-Spoofing Research Papers
We have a long library of IP Spoofing Research papers from universities worldwide. These papers are a rich & productive field of academic study exploring the risk, technique, tools, and deployment of IP anti-spoofing throughout the Internet. This page works to collect all papers in one place. Note: The materials are sorted alphabetically. This does
Practical Security Guides, References, & Workbooks
Do you feel overwhelmed by the barrage of security white papers, webinars, and guides? Are you parallized trying to figure out what you need to do first to get ready for the next attack? We don’t need more security guides, we need a consolidated landing that pulls in all the advice into one place. We
IPv4/IPv6 Anti-Spoofing – Source Address Validation (SAV) – Techniques & Tools
IPv4/IPv6 Anti-Spoofing through Source Address Validation (SAV) is one of the most promoted security best practices. We have achieved a wide range of SAV deployment, but we also run into the tedious 20% of the Internet that takes more human-intensive SAV deployment work. This guide is provided to help operators, engineers, policymakers, and executive decision-makers
What Drives Barry?
What drives Barry’s passion, drive, and empowerment focus? The following is a work in progress to help others learn from my journey, my experiences, people who have cleared the path for me, people who have helped me, and people who have been my allies for change over the last decades. This page is part of
DDoS Resiliency Workshop – 2022
Revised, Updated, and Enhance DDoS Resiliency Workshops for Today’s Internet In the late 1990s, several people started teaching ISPs how to protect their networks from attack. These early “DDoS Resiliency Workshops” evolved in a consistent theme and method that eventually curated best common practices for DDoS resiliency. Unfortunately, the threats from attacks to Communications Services