• 1

Rainatou2013 FIRE Africa Award Winner Make Every Woman Count (MEWC) is a virtual information hub that promotes African women’s participation in all aspects of development discourse. It’s an African woman-led organisation that serves as a mobilising, networking, information, advocacy and training platform for African women by building African women and girls’ leadership capacities to influence policy and decision-making.

 

 

ebDiscussions in the region are still around management of the last IPv4 /8 block and the possibility of intra and inter RIR IPv4 address transfers. Following are the policy proposals that have been discussed on the rpd mailing list lately:

Internet Number Resources Audit

The proposal enables AFRINIC to conduct regular audits of resource utilization by membersin order to ensure efficient and appropriate use of those resources. This allows recovery of any type of resource where its usage is not in compliance with the Registration Services Agreement. Recovered resources can be reallocated to other members as appropriate.

 

Cois9cFWEAAdK6xThe AFRINIC IPv6 and INRM Training team wrapped up their four-day training course in Lome Togo. 

Twenty-five people attended the training. 

Running from 26 - 29 July 2016, the training sessions were conducted at the ESIBA-IUA (Enseignement Supérieur d’Informatique, de Business et d’Administration).

We wish to extend our appreciation to the Lomé Unix Linux Users Group (LULug) for hosting this event.

AFRINIC's training programme aims to help network engineers in Africa better plan and manage Internet Number resources and IPv6 networks.

Read more on AFRINIC Trainings

You can see more of the event from the storify below.

Bio PhotoEarly security incident response teams often feel the need to replicate operations or approaches from other parts of the world instead of looking for homegrown solutions first. 

At the international level, much of information security operations are not standardized. While there are specification standards for technologies such as encryption and some sector specific requirements, cyber security does not have the level of standardization and regulation seen in other sectors yet. Much of the cyber security work today is done differently from organization to organization.