IPv6 News, Features, and Interviews


SANS: Closeted IPv6 causing “angst” amongst security pros

By Liam Tung | 01 February, 2013 10:15 | 1 Comment

Almost two years after ‘IPv6 day’ in 2011, security professionals cannot confidently manage security threats posed by the replacement to IPv4, according to the SANS Institute's Internet Storm Centre.

The week in security: New threats drive cloud-security evolution

By David Braue | 08 May, 2012 16:57

The week also saw the successful running of the Evolve.Cloud conference, which hit Sydney and Melbourne to bring together thought leaders in cloud security for an engaging program of speakers that addressed the overall idea that cloud providers need to step up when it comes to securing the data they're handling.

DDoS attackers start targeting IPv6 networks

By Lucian Constantin | 17 February, 2012 06:40

Cybercriminals have started launching distributed denial-of-service (DDoS) attacks against networks that transmit data over IPv6 (Internet Protocol version 6), according to a report published recently by DDoS mitigation vendor Arbor Networks.

IPv6 deployment starts at the network edge

By Scott Hogg | 14 February, 2012 03:40

IT execs know they will have to deploy IPv6 at some point, but where to begin? One approach that establishes some  IPv6 capability without spending a lot of time or money is to start at the perimeter.

IPv6: Dual-stack strategy starts at the perimeter

By Scott Hogg | 14 February, 2012 03:47

We are in an awkward point in the history of the Internet. IPv4 address depletion has occurred yet we expect to use IPv4 for the next 15 to 20 years. Organizations see two paths before them. One alternative is to use continue to use IPv4 and expect to use multiple layers of network address translation (NAT) for many years to come. The other alternative is to start to use IPv6, however, the majority of enterprise organizations and content providers have not embraced the protocol.


Hackers target IPv6

By Susan Perschke | 28 November, 2011 22:32 | 2 Comments

If your IPv6 strategy is to delay implementation as long as you can, you still must address IPv6 security concerns right now.


IP voice security: are you susceptible or strong?

By Gordon Makryllos | 02 May, 2012 12:56

Undoubtedly, corporations are realising the benefits of IP voice systems. Voice over internet protocol (VoIP) can bring substantial cost savings and productivity enhancements to a business by transforming its circuit-switched networks to IP packet switching networks and running voice and data applications over a single infrastructure.

CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Security Risk Management Solutions

Protect resources and ensure security compliance through incident detection, response, and remediation.

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.