With the IPv4-address exhaustion becoming closer and closer, there could be an impact on some security techniques used by Internet Service Providers (ISP) and other security organizations. Indeed, ISPx rely on the fact that part of the IPv4 address s...
Can ISP re-use their IPv4 business model for IPv6?
With IPv6 there are several options for configuring addresses... which is probably not really good for security.
Undesired/unexpected/hidden IPv6 tunnels should be blocked
How to trace back to the 'owner' of an IPv6 address?
A recent DHS report analyzed only IPv4 threats and mitigations. Is it enough?
A rogue RA is a misconfigured device or a malicious user sending wrong Router Advertisements
If you have a large network, IPv6 is probably already being used.