Privacy and Cybersecurity in the Age of the Internet of Things
IT expert Phillip Mahan gives an overview of the Internet of Things, emphasizing business concepts and how the adoption of the IoT will affect security. This keynote address was presented at the October 2015 M3AAWG 35th General Meeting in Atlanta, Georgia, U.S.A.
Have We Won the War on Spam Yet? Staying a Step Ahead
Now that we have ten years of fighting messaging abuse under our belt, M3AAWG asked two of our senior technical advisors to look back at what has changed in the industry and what's important going forward to protect end-users. Dave Crocker, principal at Brandenburg InternetWorking, and John Levine, founder of Taughannock Networks – both long-time contributors to the online anti-abuse community – share their views on the changing cybersecurity landscape and the areas that need more work in this video recorded in June 2014 during our Brussels meeting.
IPv6 Training for Senders & Others-1-Basic IPv6 For Senders
This is the first video (about 20 minutes) of three (total 67 minutes) from the training series presented by M3AAWG Sr. Technical Advisor Dr. Joe St Sauver at our October 2010 meeting. Are you prepared for this important new technology? The slides for this segment can be downloaded on M3AAWG.org, from the Activities tab under the MAAWG Training Video section.
DKIM Training Segment 1-Theory: General DKIM Architecture, What DKIM Is and Isn't
This is the first segment (20 minutes) of the extensive one hour and forty minute MAAWG DKIM Implementation Training Video originally presented at our February 2010 meeting by Dave Crocker. Dave is a M3AAWG senior advisor, principal of Brandenburg InternetWorking, and also oversees DKIM.org. Slides for this segment can be downloaded on the M3AAWG.org website under Activities, Training Videos, MAAWG DKIM Implementation Training Video
DMARC Announces New ARC Protocol at M3AAWG to Help Reduce Fraud
DMARC Executive Director Stephen Jones provides an update on email authentication, announcing the new ARC protocol at the M3AAWG General Meeting in Atlanta, October 2015. He explains how the Authenticated Receive Chain will allow senders and receivers to cooperate on stopping fraudulent messages that impersonate a domain from reaching end-users mailboxes.