‹ Back
Deploy360 7 January 2016

Deploy360 Needs You!

Kevin Meynell
By Kevin MeynellSenior Manager, Technical and Operational Engagement

Deploy306-Needs-YouThe Deploy360 programme aims to encourage deployment of key Internet technologies by providing useful resources that can help IT professionals achieve this. We can’t do this alone though, and one of our goals for 2016 is increasing the number of contributions from the Internet community where we help you share your experiences.

We’re always interested in case studies, useful tools, new standards and statistics relating to our main topics of IPv6, DNSSEC, TLS and Securing BGP, so if you have anything you’re willing to contribute or even just point us to, then please get in touch.

However, we’re particularly interested in expanding our TLS and Securing BGP content. We’d really appreciate any of the following:

  • Tutorials, guides or HOWTOs explaining how to add TLS support to the likes of web servers, e-mail systems and other applications.
  • Reports or white papers that explain why using TLS is important.
  • Tools and/or developer libraries that allow TLS support to be added to applications.
  • Case studies of security issues related to BGP.
  • Tutorials, guides or HOWTOs explaining how to improve the security of the routing system, including the usage of RPKI and BGPSEC.
  • Reports or white papers that explain why securing BGP is important.
  • Tools that improve and support the security of the routing system.

More detailed information about the type of content we’re interested in can be found on the our Roadmap for the Deploy360 Programme, and note that whilst we’d obviously be greatly appreciative if contributors do it for love, we’re willing to discuss honorariums if anyone is interested in producing original and useful content as outlined in the roadmaps.

So if you’d like to help make a contribution towards improving the security and resilience of the Internet, share your deployment experiences, or volunteer your services to Deploy360 then please don’t hesitate to get in touch.

‹ Back

Disclaimer: Viewpoints expressed in this post are those of the author and may or may not reflect official Internet Society positions.

Related articles

Improving Technical Security 15 March 2019

DNS Privacy Frequently Asked Questions (FAQ)

We previously posted about how the DNS does not inherently employ any mechanisms to provide confidentiality for DNS transactions,...

Improving Technical Security 14 March 2019

Introduction to DNS Privacy

Almost every time we use an Internet application, it starts with a DNS (Domain Name System) transaction to map...

Improving Technical Security 13 March 2019

IPv6 Security for IPv4 Engineers

It is often argued that IPv4 practices should be forgotten when deploying IPv6, as after all IPv6 is a...

Join the conversation with Internet Society members around the world