Click here to close now.


Agile Computing Authors: Yeshim Deniz, Jayaram Krishnaswamy, Elizabeth White, Ian Khan, Liz McMillan

News Feed Item

M3AAWG Tackles Emerging Security Issues With Industry Collaboration; Also Announces 2014 Leadership

SAN FRANCISCO, CA -- (Marketwired) -- 04/22/14 -- Tackling security concerns with hosting and cloud storage, pervasive monitoring, identity management, and telephony, the Messaging, Malware and Mobile Anti-Abuse Working Group has announced the formation of four new collaborative special interest groups along with its organizational leadership for 2014. The new SIGs provide a trusted venue for industry participation on critical issues while M3AAWG continues to support the ongoing work in its core security tracts.

Protecting end-users has become increasingly complex, requiring broad industry cooperation across multiple disciplines. The new M3AAWG Hosting SIG is also working with the i2Coalition and other industry partners to develop best practices. The SIG will address issues with cloud storage security, identifying and removing illegitimate accounts, and protecting hosting servers against DDoS and other attacks. The new M3AAWG Pervasive Monitoring SIG was formed in response to members' concerns related to recent disclosures about extensive governmental monitoring of the Internet and how the consequent reaction by the technical community may impact, or even reduce, the ability to mitigate online abuse.

Earlier this year, the M3AAWG Voice and Telephony Abuse SIG hosted 90 technical experts, academic researchers, public policy advisors and representatives from government and law enforcement at a two-day workshop addressing robocalls and other voice abuse problems. A second VTA SIG workshop on June 18-19 in Montreal is also open to non-members, and European industry and government representatives will attend a briefing and cooperative data exchange at the M3AAWG 31st General Meeting in Brussels, Belgium, on June 9-12.

"Sharing timely information about attack vectors, vulnerabilities and proven security methods is crucial to protecting the Internet and providing end-users an accessible and safe online experience. The collaborative work that will come out of these new SIGs will help fix urgent security issues and will augment the ongoing projects in our other M3AAWG committees to define the latest anti-abuse techniques," said Chris Roosenraad, who is with Time Warner Cable and serving his third term as M3AAWG chairman.

2014 Leadership Look to Share Best Practices and Training

M3AAWG also announced the other 2014 Board officers serving with M3AAWG Chairman Roosenraad as M3AAWG co-vice chairmen Michael Adkins, Alex Bobotek of AT&T and Jerome Cudelou of Orange. Sam Silberman of Constant Contact is treasurer and Jerry Upton continues as M3AAWG executive director.

The committees are supported in their work by M3AAWG Senior Technical Advisors, who are recognized industry experts with in depth knowledge in relevant fields. The current advisors were all reappointed for 2014 and include Richard Clayton, Ph.D.; Dave Crocker; David Dagon, Ph.D.; John Levine, Ph.D.; April Lorenzen; and Joe St Sauver, Ph.D.

M3AAWG committees develop the organization's best practices and other work that fight abuse and malware. The 2014 committee chairs are:

  • Academic Committee Co-Chairs Manos Antonakakis, Ph.D., Georgia Tech; and M3AAWG advisor Joe St Sauver, Ph.D.
  • Awards Committee Co-Chairs Tami Forman, Return Path; and Neil Schwartzman, CAUCE
  • Brand SIG Co-Chairs Mike Hammer, AG Interactive; and Franck Martin, LinkedIn
  • Collaboration Committee Co-Chairs Christine Borgia, Return Path; Angela Knox, Cloudmark; and Sara Roper, CenturyLink
  • Hosting SIG Co-Chairs M3AAWG Chairman Emeritus Michael O'Reirdan, Comcast; and Schwartzman
  • Identity Management SIG Co-Chairs O'Reirdan and St Sauver
  • M3AAWG Open Round Tables co-chairs Melinda Plemel, Return Path; and Jordan Rosenwald, Comcast
  • Pervasive Monitoring SIG with co-chairs O'Reirdan and M3AAWG co-vice chairman Adkins
  • Program Committee Co-Chairs Kurt Andersen, LinkedIn; Dennis Dayman, Oracle/Eloqua; and Len Shneyder
  • Public Policy Committee Co-Chairs Frank Ackermann; Chris Boyer, AT&T; and Rudy Brioche, Comcast
  • Senders Committee Co-Chairs Andrew Barrett, iContact, a Vocus company; and Tara Natanson, Constant Contact
  • Technical Committee Co-Chairs Henry Stern, Farsight Security; and Jamie Tomasello, CloudFlare. For specific work areas, Chris Barton, and Severin Walker, Comcast, are co-chairs for messaging; Paul Ferguson, Internet Identity; and Maxim Weinstein, Sophos, are co-chairs for malware; M3AAWG Co-Chairman Bobotek and Antti Tikkanen, F-Secure, are mobile co-chairs
  • Training Committee Co-Chairs Sam Masiello, Groupon; Vincent Schönau, Abusix; and Autum Tyr-Salvia, Marketo
  • Voice and Telephony Abuse SIG Co-Chairs Bobotek and Mustaque Ahamad, Ph.D., Georgia Tech

Beyond driving discussions on relevant issues, the committee chairs also help shape the organization's three meetings each year. The M3AAWG 31st General Meeting in Brussels will be a multi-track event with a full day of training. Industry experts will lead over 30 sessions on mobile security, technical discussions on pervasive monitoring, international public policy and other anti-abuse areas.

About the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG)

The Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) is where the industry comes together to work against bots, malware, spam, viruses, denial-of-service attacks and other online exploitation. M3AAWG ( represents more than one billion mailboxes from some of the largest network operators worldwide. It leverages the depth and experience of its global membership to tackle abuse on existing networks and new emerging services through technology, collaboration and public policy. It also works to educate global policy makers on the technical and operational issues related to online abuse and messaging. Headquartered in San Francisco, Calif., M3AAWG is driven by market needs and supported by major network operators and messaging providers.

M3AAWG Board of Directors: AT&T (NYSE: T); CenturyLink (NYSE: CTL); Cloudmark, Inc.; Comcast (NASDAQ: CMCSA); Constant Contact (NASDAQ: CTCT); Cox Communications; Damballa, Inc.; Facebook; Google; LinkedIn; Mailchimp; Orange (NYSE and Euronext: ORA); PayPal; Return Path; Time Warner Cable; Verizon Communications; and Yahoo! Inc.

M3AAWG Full Members: 1&1 Internet AG; Adobe Systems Inc.; AOL; BAE Systems Detica; Cablevision Systems Inc.; Campaign Monitor Pty.; Cisco Systems, Inc.; CloudFlare; Dynamic Network Services Inc.; iContact; Internet Initiative Japan (IIJ, NASDAQ: IIJI); Litmus; McAfee Inc.; Message Bus; Mimecast; Nominum, Inc.; Oracle/Eloqua; Proofpoint; Scality; Spamhaus; Sprint; Symantec and Twitter.

A complete member list is available at

Embedded Video Available

Embedded Video Available:

Add to Digg Bookmark with Add to Newsvine

Media Contact:
Linda Marcus, APR
1+714-974-6356 (U.S. Pacific)
Email Contact
Astra Communications

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

@ThingsExpo Stories
WebRTC is about the data channel as much as about video and audio conferencing. However, basically all commercial WebRTC applications have been built with a focus on audio and video. The handling of “data” has been limited to text chat and file download – all other data sharing seems to end with screensharing. What is holding back a more intensive use of peer-to-peer data? In her session at @ThingsExpo, Dr Silvia Pfeiffer, WebRTC Applications Team Lead at National ICT Australia, will look at different existing uses of peer-to-peer data sharing and how it can become useful in a live session to...
As a company adopts a DevOps approach to software development, what are key things that both the Dev and Ops side of the business must keep in mind to ensure effective continuous delivery? In his session at DevOps Summit, Mark Hydar, Head of DevOps, Ericsson TV Platforms, will share best practices and provide helpful tips for Ops teams to adopt an open line of communication with the development side of the house to ensure success between the two sides.
NHK, Japan Broadcasting, will feature the upcoming @ThingsExpo Silicon Valley in a special 'Internet of Things' and smart technology documentary that will be filmed on the expo floor between November 3 to 5, 2015, in Santa Clara. NHK is the sole public TV network in Japan equivalent to the BBC in the UK and the largest in Asia with many award-winning science and technology programs. Japanese TV is producing a documentary about IoT and Smart technology and will be covering @ThingsExpo Silicon Valley. The program, to be aired during the peak viewership season of the year, will have a major impac...
There are so many tools and techniques for data analytics that even for a data scientist the choices, possible systems, and even the types of data can be daunting. In his session at @ThingsExpo, Chris Harrold, Global CTO for Big Data Solutions for EMC Corporation, will show how to perform a simple, but meaningful analysis of social sentiment data using freely available tools that take only minutes to download and install. Participants will get the download information, scripts, and complete end-to-end walkthrough of the analysis from start to finish. Participants will also be given the pract...
SYS-CON Events announced today that IBM Cloud Data Services has been named “Bronze Sponsor” of SYS-CON's 17th Cloud Expo, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. IBM Cloud Data Services offers a portfolio of integrated, best-of-breed cloud data services for developers focused on mobile computing and analytics use cases.
The enterprise is being consumerized, and the consumer is being enterprised. Moore's Law does not matter anymore, the future belongs to business virtualization powered by invisible service architecture, powered by hyperscale and hyperconvergence, and facilitated by vertical streaming and horizontal scaling and consolidation. Both buyers and sellers want instant results, and from paperwork to paperless to mindless is the ultimate goal for any seamless transaction. The sweetest sweet spot in innovation is automation. The most painful pain point for any business is the mismatch between supplies a...
The buzz continues for cloud, data analytics and the Internet of Things (IoT) and their collective impact across all industries. But a new conversation is emerging - how do companies use industry disruption and technology enablers to lead in markets undergoing change, uncertainty and ambiguity? Organizations of all sizes need to evolve and transform, often under massive pressure, as industry lines blur and merge and traditional business models are assaulted and turned upside down. In this new data-driven world, marketplaces reign supreme while interoperability, APIs and applications deliver un...
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data shows "less than 10 percent of IoT developers are making enough to support a reasonably sized team....
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
Nowadays, a large number of sensors and devices are connected to the network. Leading-edge IoT technologies integrate various types of sensor data to create a new value for several business decision scenarios. The transparent cloud is a model of a new IoT emergence service platform. Many service providers store and access various types of sensor data in order to create and find out new business values by integrating such data.
The broad selection of hardware, the rapid evolution of operating systems and the time-to-market for mobile apps has been so rapid that new challenges for developers and engineers arise every day. Security, testing, hosting, and other metrics have to be considered through the process. In his session at Big Data Expo, Walter Maguire, Chief Field Technologist, HP Big Data Group, at Hewlett-Packard, will discuss the challenges faced by developers and a composite Big Data applications builder, focusing on how to help solve the problems that developers are continuously battling.
Who are you? How do you introduce yourself? Do you use a name, or do you greet a friend by the last four digits of his social security number? Assuming you don’t, why are we content to associate our identity with 10 random digits assigned by our phone company? Identity is an issue that affects everyone, but as individuals we don’t spend a lot of time thinking about it. In his session at @ThingsExpo, Ben Klang, Founder & President of Mojo Lingo, will discuss the impact of technology on identity. Should we federate, or not? How should identity be secured? Who owns the identity? How is identity ...
Developing software for the Internet of Things (IoT) comes with its own set of challenges. Security, privacy, and unified standards are a few key issues. In addition, each IoT product is comprised of at least three separate application components: the software embedded in the device, the backend big-data service, and the mobile application for the end user's controls. Each component is developed by a different team, using different technologies and practices, and deployed to a different stack/target - this makes the integration of these separate pipelines and the coordination of software upd...
WebRTC converts the entire network into a ubiquitous communications cloud thereby connecting anytime, anywhere through any point. In his session at WebRTC Summit,, Mark Castleman, EIR at Bell Labs and Head of Future X Labs, will discuss how the transformational nature of communications is achieved through the democratizing force of WebRTC. WebRTC is doing for voice what HTML did for web content.
WebRTC services have already permeated corporate communications in the form of videoconferencing solutions. However, WebRTC has the potential of going beyond and catalyzing a new class of services providing more than calls with capabilities such as mass-scale real-time media broadcasting, enriched and augmented video, person-to-machine and machine-to-machine communications. In his session at @ThingsExpo, Luis Lopez, CEO of Kurento, will introduce the technologies required for implementing these ideas and some early experiments performed in the Kurento open source software community in areas ...
WebRTC: together these advances have created a perfect storm of technologies that are disrupting and transforming classic communications models and ecosystems. In his session at WebRTC Summit, Cary Bran, VP of Innovation and New Ventures at Plantronics and PLT Labs, will provide an overview of this technological shift, including associated business and consumer communications impacts, and opportunities it may enable, complement or entirely transform.
“In the past year we've seen a lot of stabilization of WebRTC. You can now use it in production with a far greater degree of certainty. A lot of the real developments in the past year have been in things like the data channel, which will enable a whole new type of application," explained Peter Dunkley, Technical Director at Acision, in this interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
SYS-CON Events announced today that Luxoft Holding, Inc., a leading provider of software development services and innovative IT solutions, has been named “Bronze Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Luxoft’s software development services consist of core and mission-critical custom software development and support, product engineering and testing, and technology consulting.
SYS-CON Events announced today that Dyn, the worldwide leader in Internet Performance, will exhibit at SYS-CON's 17th International Cloud Expo®, which will take place on November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Dyn is a cloud-based Internet Performance company. Dyn helps companies monitor, control, and optimize online infrastructure for an exceptional end-user experience. Through a world-class network and unrivaled, objective intelligence into Internet conditions, Dyn ensures traffic gets delivered faster, safer, and more reliably than ever.