-
At the
#DNSSec root signing ceremony we decommissioned one of the HSM. We first made sure it’s tamper detection kicked in. pic.twitter.com/hSnEhWoQ9e
-
Maintenance and bugfix release of http://Internet.nl : many improvements under the hood for more stability, speed and accuracy! https://en.internet.nl/article/onderhouds-en-bugfixrelease-van-internet-nl/ …
#happytesting#moderninternet#standards#IPv6#DNSSEC#HTTPS#DMARC#DANEpic.twitter.com/qkc7QdEfDD
-
Saturday Night Live Key Signing Ceremony - a first!
#DNSSEC pic.twitter.com/fAxLWv5X1a
-
DNSSEC is firmly on the rise: https://twitter.com/VDukhovni/status/1305395200601272320 … Is your domain name already
#DNSSEC signed? Test it with https://Internet.nl .pic.twitter.com/KMavrGfF4s
-
Open DNS resolvers that answer
#DNSSEC signed domains still remain key targets for DNS-based#DDoS attacks,@utwenteEN study reveals https://blog.apnic.net/2022/05/13/open-dns-resolvers-from-bad-to-worse/ …pic.twitter.com/zA6BKQRaEC
-
We are pleased to inform you that SafeDNS has released a new feature - AppBlocker! Join us live at the webinar on 18 May at 2 PM (EDT), where our specialists will introduce you to AppBlocker. Register: https://www.promo.safedns.com/appblocker
#dnssec#CyberSecuritypic.twitter.com/CHZIoFQLYq
-
I brag myself. AS50242 (local ISP) ready for
#ipv6 - name servers, recursive resolvers, MX, websites.#rpki signed prefix and#dnssec signed reverse zone. Ready to deploy /56 for SOHO and /48 for L3 customers... What to do next? pic.twitter.com/Mu6Pw5UYsG
-
A couple of modest
#DNSSEC milestones: * The .COM zone is now 3.0011% signed * The .ORG zone will be >4.00% signed in a day or two, presently 3.9955%. The .NET signed fraction is between these two at ~3.44%(just above the harmonic mean). Progress expected to pick up this year. -
#ICANN's Office of the CTO has published a paper on DNS Security Extensions algorithm use in 2022. This document gives a brief overview of the algorithms, key sizes, and other options used in DNSKEY records in the DNS near the beginning of 2022 >> https://go.icann.org/3uafnuV#DNSSEC pic.twitter.com/P2SFdAm0iT
-
We have been teaching
#DNSSEC at#PacNOG28 workshop.@nsrcworld#ICANNpic.twitter.com/Q2idnFyEPE
-
DNSSEC is a fundamental security technology for a
#SaferInternet. 36.5% of .ch domain names are now signed with#DNSSEC. Target by 2026: 60% Thank you#registrars and#hosters. More interactive charts: https://swit.ch/2cr0v@switchcert#CyberSecurity#dnsResiliencepic.twitter.com/bR1f9vFrAj
-
Coming Soon: Outbound SMTP DANE with DNSSEC - https://techcommunity.microsoft.com/t5/exchange-team-blog/coming-soon-outbound-smtp-dane-with-dnssec/ba-p/3100920 …
#MSExchange#SMTP#DANE#DNSSEC -
Wow! Czech National Cyber and Information Security Agency
@NUKIB_CZ just made it mandatory to use#DNSSEC and#DANE on all email systems which are subject of NIS directive regulation in
.
https://nukib.cz/download/uredni_deska/2021-10-08_OchranneOpatreni_final_ENG.pdf …Show this thread -
How to enable
#DNS over#HTTPS (#DoH) in each#browser.#dataprotection#datasecurity#CyberSecurity#fintech#cybersec#InfoSec#dnssec#infosecurity#dataprivacy#data#privacy#technology#DevOps#cyberattacks#Security#GPS#tracking#NetworkSecurity https://www.zdnet.com/article/dns-over-https-will-eventually-roll-out-in-all-major-browsers-despite-isp-opposition/ …pic.twitter.com/ZpInS9mjpX
-
Uh oh, http://admin.ch admins should fix this
#DNSSEC error soon
https://dnsviz.net/d/admin.ch/dnssec/ …pic.twitter.com/X2NcJ9AD8Y
Show this thread -
Here's everything you need to know about our DNS infrastructure! https://bit.ly/3Hw2cJ7
#DNS#DNSSEC#cybersecurity#websiteservices#domains#webhostingpic.twitter.com/gXX4Fteiwf
-
To save your organization from the consequences of DNS attacks, you must understand the attack vectors and take measures to prevent the attack from occurring.
#dnsattacks#DNSSEC#securitycontrols#databreach#securityresilience https://bit.ly/3Cw9vOg pic.twitter.com/8tyNssTZCL
-
Trying out
@ensdomains features and when I went to register a web domain (because why not?) it apparently takes 0.24 eth in gas, to do this. Why?#ens#DNSSEC#Ensdomainspic.twitter.com/lPXqOHh6xV
-
Finally blogged 'the MirageOS unikernel road ahead for 2021' - https://hannes.robur.coop/Posts/NGI
#MirageOS#unikernel#OCaml#NetHSM#TLS#DNSSec \o/#robur
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.
