ICANN 72: Difference between revisions
| Line 33: | Line 33: | ||
===DNS Abuse=== | ===DNS Abuse=== | ||
* In the public forum, [[Steve DelBianco]] asked the Board if they would support updating contracts to enforce DNS abuse mitigation across the industry. [[Becky Burr]] said [[Contractual Compliance]] believes it has the right tools for right now. | |||
* In the [[NCSG]] membership meeting, [[Theo Geurts]], of [[Realtime Register#RiskReact|RiskReact]], presented a demonstration of [[Realtime Register]]'s DNS abuse monitoring system<ref>[https://realtimeregister.com/blog/security-threat-monitoring-beta/ Security Threat Dashboard, Realtime Register Blog]</ref> and discussed the implications of a couple of significant findings: | * In the [[NCSG]] membership meeting, [[Theo Geurts]], of [[Realtime Register#RiskReact|RiskReact]], presented a demonstration of [[Realtime Register]]'s DNS abuse monitoring system<ref>[https://realtimeregister.com/blog/security-threat-monitoring-beta/ Security Threat Dashboard, Realtime Register Blog]</ref> and discussed the implications of a couple of significant findings: | ||
# 82% of malicious activity is happening at the [[URL]] level, and thus, out of the technical and policy reach of ICANN's contracted parties. Abuse happening at this level falls under the remit of resellers and web hosters. | # 82% of malicious activity is happening at the [[URL]] level, and thus, out of the technical and policy reach of ICANN's contracted parties. Abuse happening at this level falls under the remit of resellers and web hosters. | ||