Welcome!

News Feed Item

Public Launch of Secure Domain Foundation: Non-Profit Organization of Internet Infrastructure Operators and Security Experts Join Forces to Identify and Stop Cyber Criminals

New, free API now available to domain registrars, registries and ccTLD operators - identifies malicious domain registrations and provides ICANN-mandated address validation services

SINGAPORE, March 23, 2014 /PRNewswire/ -- ICANN 49 -- Leading experts and companies in the cybersecurity, Internet and Domain Name infrastructure industry today announced the formation of the Secure Domain Foundation (SDF), a new, non-profit, community-driven organization devoted to the identification and prevention of Internet cyber crime.

Launched at ICANN's 49th Public Meeting in Singapore, the SDF is backed by some of the industry's leading Internet and Domain Name infrastructure companies and organizations including: Facebook, Verizon, Verisign, Enom, Name.com, CIRA(.ca), CO Internet(.co), CrowdStrike, the Anti-Phishing Working Group (APWG), Emerging Threats, ESET Anti-Virus, DomainTools, Internet Identity, CoCCA, Mailshell, Blacknight Solutions, Foreground Security, and the SecDev Group.

Founded by world-renowned security researcher Chris Davis who was responsible for taking down the infamous Mariposa botnet, and domain industry expert, Norm Ritchie, who has been designated as one of 7 trusted individuals in the world to hold the key to secure the Internet DNS root zone in the event of a catastrophe, the SDF was formed to help prevent criminal abuse on the Internet. Grounded in the spirit of cooperative efforts and sharing of information on bad actors, the SDF will provide no-cost tools, technology, research, and security intelligence to an initial market segment of Internet domain name registrars, registries, ccTLD operators, and gTLD operators.  In the coming months, the SDF plans to expand services to hosting providers, DNS operators, CERTs, law enforcement and other Internet infrastructure operators.

Today, the SDF is launching a free API service to obtain an instant domain or registrant "credit score" based on security reputation and contact data validation. This API is made available to domain name registrars and registries for use during domain name transactions such as new account creation, domain registration, and record updates. Criminals have long used domain names to control botnets, distribute malware, and compromise unsuspecting visitors, and the purpose of the SDF API is to rapidly identify and shut down those activities at the time of domain registration. 

"ICANN has recently mandated that domain registrars must validate postal addresses, phone numbers, and email addresses that are provided as contact information during the domain registration process," said Norm Ritchie, Chairman of the SDF. "And many new gTLD registries have already pledged to take a more proactive role in combating domain abuse within their TLDs. The SDF provides an entirely free service that not only validates the contact registration data provided but also lets the registrar and registry know if we have seen that data used previously in relation to cyber crime."

"Rightside has been an early supporter of the SDF and its mission. Over the past two years, the SDF has been quietly and skillfully compiling an extensive database of malicious domains and actors. It has been an excellent resource for us. We are very proud and excited to be a partner of the Secure Domain Foundation and we look forward to incorporating the contact data validation services into our domain registration processes," said Wayne MacLaurin, CTO of Demand Media companies Enom, Name.com and Rightside Registry.

"Beyond our current offering of tools and services, we are also dedicated to raising the cost and risk of cyber crime," said Chris Davis, President of the SDF. "With our partners, we analyze hundreds of thousands of malware samples daily and actively engage with registries, registrars and hosting providers to shut down the criminal command and control infrastructure. Our staff and volunteer researchers and analysts work tirelessly to provide criminal attribution intelligence to the proper global law enforcement organizations and help to bring these criminals to justice."

The SDF will be participating in ICANN's 49th Public Meeting this week in Singapore.

About The Secure Domain Foundation (SDF)

Launched in 2014, the Secure Domain Foundation (SDF) is a Canadian incorporated, not-for-profit organization dedicated to the vision of an open and secure Internet. We are a public benefit, community driven organization.

Our primary mission is to provide Domain Name Registrars, registries (ccTLD & gTLD), hosting providers, DNS operators, and other Internet infrastructure providers with the tools they need to combat abuse of their services and a forum for sharing intelligence on bad actors. Founding members and corporate sponsors of the SDF include: Facebook, Verizon, Verisign, Enom, Name.com, CIRA(.ca), CO Internet(.co), CrowdStrike, APWG (Anti-Phishing Working Group), Emerging Threats, ESET Anti-Virus, DomainTools, Internet Identity, CoCCA, Mailshell, Blacknight Solutions, Foreground Security, and the SecDev Group. For more information, please visit: http://www.securedomain.org or follow us on Twitter at https://twitter.com/SecureDomain.

SOURCE Secure Domain Foundation

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Most companies are adopting or evaluating container technology - Docker in particular - to speed up application deployment, drive down cost, ease management and make application delivery more flexible overall. As with most new architectures, this dream takes a lot of work to become a reality. Even when you do get your application componentized enough and packaged properly, there are still challenges for DevOps teams to making the shift to continuous delivery and achieving that reduction in cost ...
In his session at 20th Cloud Expo, Scott Davis, CTO of Embotics, discussed how automation can provide the dynamic management required to cost-effectively deliver microservices and container solutions at scale. He also discussed how flexible automation is the key to effectively bridging and seamlessly coordinating both IT and developer needs for component orchestration across disparate clouds – an increasingly important requirement at today’s multi-cloud enterprise.
DevOps at Cloud Expo, taking place October 31 - November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 21st Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to w...
Recently, WebRTC has a lot of eyes from market. The use cases of WebRTC are expanding - video chat, online education, online health care etc. Not only for human-to-human communication, but also IoT use cases such as machine to human use cases can be seen recently. One of the typical use-case is remote camera monitoring. With WebRTC, people can have interoperability and flexibility for deploying monitoring service. However, the benefit of WebRTC for IoT is not only its convenience and interopera...
Vulnerability management is vital for large companies that need to secure containers across thousands of hosts, but many struggle to understand how exposed they are when they discover a new high security vulnerability. In his session at 21st Cloud Expo, John Morello, CTO of Twistlock, will address this pressing concern by introducing the concept of the “Vulnerability Risk Tree API,” which brings all the data together in a simple REST endpoint, allowing companies to easily grasp the severity of t...
Any startup has to have a clear go –to-market strategy from the beginning. Similarly, any data science project has to have a go to production strategy from its first days, so it could go beyond proof-of-concept. Machine learning and artificial intelligence in production would result in hundreds of training pipelines and machine learning models that are continuously revised by teams of data scientists and seamlessly connected with web applications for tenants and users.
When shopping for a new data processing platform for IoT solutions, many development teams want to be able to test-drive options before making a choice. Yet when evaluating an IoT solution, it’s simply not feasible to do so at scale with physical devices. Building a sensor simulator is the next best choice; however, generating a realistic simulation at very high TPS with ease of configurability is a formidable challenge. When dealing with multiple application or transport protocols, you would be...
IT organizations are moving to the cloud in hopes to approve efficiency, increase agility and save money. Migrating workloads might seem like a simple task, but what many businesses don’t realize is that application migration criteria differs across organizations, making it difficult for architects to arrive at an accurate TCO number. In his session at 21st Cloud Expo, Joe Kinsella, CTO of CloudHealth Technologies, will offer a systematic approach to understanding the TCO of a cloud application...
Connecting to major cloud service providers is becoming central to doing business. But your cloud provider’s performance is only as good as your connectivity solution. Massive Networks will place you in the driver's seat by exposing how you can extend your LAN from any location to include any cloud platform through an advanced high-performance connection that is secure and dedicated to your business-critical data. In his session at 21st Cloud Expo, Paul Mako, CEO & CIO of Massive Networks, wil...
"With Digital Experience Monitoring what used to be a simple visit to a web page has exploded into app on phones, data from social media feeds, competitive benchmarking - these are all components that are only available because of some type of digital asset," explained Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Systems, in this SYS-CON.tv interview at DevOps Summit at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
SYS-CON Events announced today that Secure Channels, a cybersecurity firm, will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Secure Channels, Inc. offers several products and solutions to its many clients, helping them protect critical data from being compromised and access to computer networks from the unauthorized. The company develops comprehensive data encryption security strategie...
An increasing number of companies are creating products that combine data with analytical capabilities. Running interactive queries on Big Data requires complex architectures to store and query data effectively, typically involving data streams, an choosing efficient file format/database and multiple independent systems that are tied together through custom-engineered pipelines. In his session at @BigDataExpo at @ThingsExpo, Tomer Levi, a senior software engineer at Intel’s Advanced Analytics ...
Cloud adoption is often driven by a desire to increase efficiency, boost agility and save money. All too often, however, the reality involves unpredictable cost spikes and lack of oversight due to resource limitations. In his session at 20th Cloud Expo, Joe Kinsella, CTO and Founder of CloudHealth Technologies, tackled the question: “How do you build a fully optimized cloud?” He will examine: Why TCO is critical to achieving cloud success – and why attendees should be thinking holistically ab...
yperConvergence came to market with the objective of being simple, flexible and to help drive down operating expenses. It reduced the footprint by bundling the compute/storage/network into one box. This brought a new set of challenges as the HyperConverged vendors are very focused on their own proprietary building blocks. If you want to scale in a certain way, let’s say you identified a need for more storage and want to add a device that is not sold by the HyperConverged vendor, forget about it....
As businesses adopt functionalities in cloud computing, it’s imperative that IT operations consistently ensure cloud systems work correctly – all of the time, and to their best capabilities. In his session at @BigDataExpo, Bernd Harzog, CEO and founder of OpsDataStore, presented an industry answer to the common question, “Are you running IT operations as efficiently and as cost effectively as you need to?” He then expounded on the industry issues he frequently came up against as an analyst, and ...