We have had a number of requests for suggestions about how to optimize Kea performance. These suggestions are general guidance; as always, your results will depend on your hardware and software choices, the size and complexity of your configuration, and local factors such as network latency. Kea performance test results for some recent versions are available at https://reports.kea.isc.org/. 1. Choose the right lease file backend Every lease must be written to disk. The choice of where this file ...
The Network The network described here is a small cable modem-based ISP network with only one service area. This simple network is depicted in the diagram below. Requirements Summary A Kea configuration for cable services can be complicated even if the service area consists of only one POP. This is due to the variety of networks that may simultaneously exist on a single cable modem at a customer residence. There could be as many as three in a typical deployment. One for the cable modem itself, ...
CISA official Eric Goldstein to step down next month
Eric Goldstein will depart from his role as executive assistant director for cybersecurity at the Cybersecurity and Infrastructure Security Agency next month, CyberScoop reports.
Australians’ prescription records breached in large-scale ransomware attack
The country’s federal government has stepped in following the hack of e-script provider MediSecure, but it’s unclear how much personal and medical data was stolen.
Financial companies must have data breach incident plans, SEC says
The Securities and Exchange Commission announced amendments to a 24-year regulation that will require certain financial firms including broker-dealers, funding portals, registered investment advisers, transfer agents, and investment companies to create well-defined response plans for data breach incidents, reports The Record, a news site by cybersecurity firm Recorded Future.
Arrests made in North Korean remote job scam targeting US firms
U.S. prosecutors announced the arrests of an American woman and a Ukrainian man for aiding North Korean IT workers posing as Americans to secure remote jobs at over 300 U.S. companies, Reuters reports.