The first part of this two-part series took a closer look at best practices for detecting and reporting DNS abuse (see: “Best practices for effectively dealing with DNS abuse”). It is now crucial to ...