Skip to main content

65th General Meeting

October 13, 2025 to October 16, 2025
Charlotte - United States
M3AAWG

M3AAWG

Login Logout
  • About Us
    • Why M3AAWG?
    • Join Us - Membership
    • Our Members
    • Our Partners
    • Leadership
    • M3AAWG Strategies
    • Expert Advisors
    • Contact Us
    • About Us Resources
    • Consumer Information
  • Meetings
    • Upcoming Meetings
    • Call for Proposals
    • M3AAWG Glossary
    • Training Videos
    • Keynotes Videos
  • For the Industry
    • Best Practices
    • Multiple Languages
    • Public Policy
    • Supporting Documents
    • Technology Summaries
  • Outreach
    • Partners
    • Awards
    • Feedback Loop Resources
    • ABCs for ISPs
  • News
    • Social Media
    • M3AAWG Blog
    • M3AAWG 5 Episodes
    • News Releases
    • M3AAWG in the News
  • Member Login
    • Member Login
    • Request a Member ID and Password
    • Forgot My Password
Conduct Policy | Privacy Notice   Facebook icon  youtube icon  linkedin icon

M3AAWG Blog

Home › M3AAWG Blog

Updates and Commentary from the Messaging, Malware and Mobile Anti-Abuse Working Group

Combatting Political Text Message Abuse: Best Practices for Today’s Digital Campaigns

The Promise and Perils of Quantum Computing

Making phone number porting more secure

Jerry Upton Retirement Speech

M3AAWG expands the Anti-Abuse fight to include new emerging threats and associated technologies

Back to Basics: Securing U.S. Elections Requires a Return to Time-Tested Tactics

M3AAWG Attends JP-AAWG’s Second Annual Meeting, Deepening International Collaboration

M3AAWG expands the Anti-Abuse fight to include new emerging threats and associated technologies

M3AAWG expands the Anti-Abuse fight to include new emerging threats and associated technologies

Our Commitment in M3AAWG to Diversity and Inclusion – A “Pioneers in Skirts” Endorsement

Pages

  • « first
  • ‹ previous
  • …
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • next ›
  • last »
Subscribe to M3AAWG Blog

Subscribe to Blog

Privacy Note:
By subscribing to the M3AAWG Blog and giving us your email address you are giving us permission to send you timely emails with newly posted blog updates. If at any time you do not want to receive these notifications, please follow the info about unsubscribing at the bottom of these emails.

Recent Posts

M3AAWG5: Policy and Regulation is About Applying Our Collective Expertise to Mitigate Abuse
Global Momentum Builds Toward Secure IoT Ecosystems
Finance, Fraud, and the Future: A First Look at M3AAWG’s 65th General Meeting Agenda
M3AAWG5: A Focus on “User & Endpoint” Means Prioritizing Where Online Abuse Lands, Impacts People, and Exploits Trust
M3AAWG5: Prioritizing Platform & Infrastructure to Help “Harden the Stack”
more

Blog Categories

  • Abuse Desk (1)
  • AF-AAWG (2)
  • AI (1)
  • Artificial Intelligence (1)
  • Awards (4)
  • BEC (1)
  • best practices (1)
  • Blog (1)
  • Board (1)
  • Comments (1)
  • Cryptography (1)
  • CSAM (1)
  • cybersecurity (1)
  • DDoS (1)
  • diversity (4)
  • Diversity and Inclusion (1)
  • DMARC (1)
  • DNS (1)
  • DNS Abuse (1)
  • Elections (3)
  • Email Authentication (1)
  • Email Deliverability (1)
  • encryption (1)
  • Engagement Series (1)
  • Expert Advisor (1)
  • GDPR Compliance (1)
  • Hosting (1)
  • IoT (2)
  • JP-AAWG (2)
  • keynote (5)
  • LAC-AAWG (1)
  • M3AAWG 5 (8)
  • M3AAWG 51 (1)
  • M3AAWG 52 (1)
  • M3AAWG 53 (5)
  • M3AAWG 58 (1)
  • Meeting (1)
  • meetings (1)
  • messages (1)
  • Messaging (4)
  • Mobile (3)
  • Names and Numbers (1)
  • Open Source Applications (1)
  • Public Policy (3)
  • Quantum Computing (2)
  • Ransomware (1)
  • Security (4)
  • Security and Safety (4)
  • SMTP (1)
  • Teleconference (1)
  • UCENet (1)

Blog Tags

  • M3AAWG 5 (9)
  • M3AAWG 53 (6)
  • Keynote (5)
  • Elections (4)
  • anti-abuse (4)
  • Security and Safety (4)
  • Security (4)
  • Awards (3)
  • Attack (3)
  • DNS (2)
  • fighting spam (2)
  • IoT (2)
  • M3AAWG 51 (2)
  • Best Practice (2)
  • JP-AAWG (2)
  • Quantum Computing (2)
  • M3AAWG58 (2)
  • Mobile (2)
  • CSAM (1)
  • AAWG (1)
  • GDPR (1)
  • GCA (1)
  • ISOC (1)
  • DoH (1)
  • COVID-19 (1)
  • Outreach (1)
  • encryption (1)
  • Meeting (1)
  • BeCyberSmart (1)
  • Phishing (1)
  • Calendar Spam (1)
  • TLS (1)
  • Mary Litynski Award (1)
  • spam (1)
  • International Collaboration (1)
  • Public Policy comments (1)
  • blocking (1)
  • SMTP Multipass (1)
  • RPKI (1)
  • Cryptography (1)
  • M3AAWG57 (1)
  • malicious (1)
  • M3AAWG 5; IoT (1)
  • Domain Names (1)
  • Executive Director (1)
  • messages (1)
  • M3AAWG 52 (1)
  • JD Falk (1)
  • Retirement (1)
  • Email deliverability (1)
  • LNP (1)
  • Engagement Series (1)
  • DNS Abuse (1)
  • AF-AAWG (1)
  • Open Source Applications (1)
  • ICANN (1)
  • Messaging (1)
  • APWG (1)
  • Abuse (1)
  • Training (1)
  • Names and Numbers (1)
  • Blog (1)
  • Child (1)
  • Initiatives (1)
  • J.D. Falk (1)
  • Teleconference (1)
  • CFCA (1)

Blog Archive

None at this time.

  • ‹ previous
  • 2 of 2
  •  
  • About Us
  • Our Members
  • Join Us
  • Meetings
  • Best Practices
  • Messaging
  • Malware
  • Mobile
  • Public Policy
  • Training
  • Technology Summaries
  • Initiatives
  • News
  • Videos
  • Awards
  • Contact Us

© Copyright 2025 Messaging, Malware and Mobile Anti-Abuse Working Group ( M3AAWG )
P.O. Box 9125, Brea, CA 92822

  • Contact Us
  • Media Contact
  • Conduct Policy
  • Privacy Notice