BGP does a great job of identifying optimal paths across the internet, but its lack of security controls allows the protocol to be exploited. Whenever someone asks me, “What is border gateway routing protocol (BGP)?” I always use the following analogy to explain it: BGP is like the postal service. When you address a letter..
The post Protect Your Enterprise From BGP Route Hijacking appeared first on Security Boulevard.
Advertise on IT Security News.
Read the complete article: Protect Your Enterprise From BGP Route Hijacking