2011 Merit Member Conference attendees talk about the conference.
Take a tour down memory lane! Follow a brief history of Merit Network, celebrating 50 years of innovation.
As a real-world example, we display an animation that illustrates AMON in action! In the following case study, AMON’s visualization module displays the databricks as captured during the course of a large DDoS attack ag..
Merit continues to leverage its experience managing NSFNET, the precursor to the modern Internet, to catapult Michigan into the forefront of networking technologies. Merit has implemented a 10 Gbps backbone and is in the..
Joe Adams will update a number of Cyber Range activities, including its use in academic courses, a new set of Range hardware at Northern Michigan University, and a Red Team/Blue Team exercise recently conducted in Grand ..
In the virtual town of Alphaville, a pair of hapless cybersecurity students must defend the city's zombie containment system from malicious hackers bent on unleashing the undead hordes. Good thing it's only a training ex..
Webinar featuring Theresa Rowe, CIO of Oakland University, discussing techniques for managing interactions with information technology service providers.
Debuted at MCRCon 2016, the latest film from the Michigan Cyber Range follows a man assisted by a cybersecurity expert to find the right balance in his security program.
Building Shared Services: REMC1's Approach. Presentation by Mike Richardson of REMC1 at MJTS meeting, March 21, 2012.