{"id":141,"date":"2024-09-05T12:31:52","date_gmt":"2024-09-05T12:31:52","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=141"},"modified":"2024-09-05T12:31:52","modified_gmt":"2024-09-05T12:31:52","slug":"white-house-brands-bgp-routing-a-national-security-concern-as-it-unveils-reform-roadmap","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=141","title":{"rendered":"White House brands BGP routing a \u2018national security concern\u2019 as it unveils reform roadmap"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>The White House Office of the National Cyber Director (ONCD) has published its roadmap for fixing increasingly troublesome security weaknesses in the Internet\u2019s core routing protocol, Border Gateway Protocol (BGP).<\/p>\n<p><a href=\"https:\/\/www.networkworld.com\/article\/969572\/bgp-what-is-border-gateway-protocol-and-how-does-it-work.html\">BGP<\/a>\u00a0is infamously prone to configuration errors that can have consequences serious enough to temporarily disrupt parts of the Internet. It\u2019s also the target of attacks that, among other things, maliciously divert traffic.<\/p>\n<p><a href=\"https:\/\/www.networkworld.com\/article\/3504845\/white-house-brands-bgp-routing-a-national-security-concern-as-it-unveils-reform-roadmap.html\">Continue reading on Network World<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>The White House Office of the National Cyber Director (ONCD) has published its roadmap for fixing increasingly troublesome security weaknesses in the Internet\u2019s core routing protocol, Border Gateway Protocol (BGP). BGP\u00a0is infamously prone to configuration errors that can have consequences serious enough to temporarily disrupt parts of the Internet. It\u2019s also the target of attacks [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":142,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-141","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/141"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=141"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/141\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/142"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=141"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=141"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}