Security

Securing Workflows Using Microservices

Ongoing efforts in the security community have tried to achieve desirable security properties, such as secure data at rest and in transport, policy enforcement, and data leak prevention for many years. Those efforts culminated in the design of …

A Taxonomy of Attacks Using BGP Blackholing

BGP blackholing is a common technique used to mitigate DDoS attacks. Generally, the victim sends in a request for traffic to the attacked IP(s) to be dropped. Unfortunately, remote parties may misuse blackholing and send requests for IPs they do not …

A Taxonomy of Attacks Using BGP Blackholing

BGP blackholing is a common technique used to mitigate DDoS attacks. Generally, the victim sends in a request for traffic to the attacked IP(s) to be dropped. Unfortunately, remote parties may misuse blackholing and send requests for IPs they do not …

Securing Workflows Using the Microservices Architecture

Ongoing efforts in the security community have tried to achieve desirable security properties, such as secure data at rest and in transport, policy enforcement, and data leak prevention for many years. Those efforts culminated in the design of …