Hosters vs. Malware: Best Practices

  • 1,223 views
Uploaded on

Presentation to the RIPE Anti-Abuse Working Group at RIPE63 in Vienna, November 2011. Covers adopting best practices to handle malware and other forms of network abuse for hosting providers and …

Presentation to the RIPE Anti-Abuse Working Group at RIPE63 in Vienna, November 2011. Covers adopting best practices to handle malware and other forms of network abuse for hosting providers and network operators

More in: Technology , Business
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
1,223
On Slideshare
0
From Embeds
0
Number of Embeds
3

Actions

Shares
Downloads
1
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Hosters vs. Malware: Best Practices BLACKNIGHT Domain Registrar – Hosting Provider
  • 2. BLACKNIGHT Michele Neylon Founder / CEO Blacknight Contact: http://mneylon.tel @mneylon / @blacknight http://www.blacknight.com http://michele.me/blog
  • 3. BLACKNIGHT Overview  Why does it matter?  Some Guidelines / Best Practices
  • 4. BLACKNIGHT
  • 5. BLACKNIGHT Security Issues / Abuse are not going away Apathy is NOT an option Self-regulation vs Regulation + govt intervention Image / brand / reputation => You value them, don’t you?
  • 6. BLACKNIGHT
  • 7. BLACKNIGHT Self-regulation => control remains with industry => retain control of destiny Govt. Regulation => industry input possibly ignored => lose control of destiny
  • 8. BLACKNIGHT
  • 9. BLACKNIGHT Abuse desk best practices => not rocket science No need to think – someone’s already developed some StopBadware (http://stopbadware.org/best- practices/web-hosting-providers)
  • 10. StopBadWare Action Flow1. Acknowledge report2. Evaluate report3. Pass on the report4. Mitigate5. Resolve6. Notify reporter7. Track8. Review
  • 11. BLACKNIGHT
  • 12. BLACKNIGHT
  • 13. BLACKNIGHT
  • 14. BLACKNIGHT Questions? Complaints? Photo credits: IStockPhoto http://www.flickr.com/photos/forbairt/