Home / Blogs

J.D. Falk Award

Laura Atkins

This morning M3AAWG announced the creation of the J.D. Falk award to recognize and honor people like J.D. who work to make the Internet safer for all users.

"Nominees can be individuals or teams in an academic or company environment who have developed a service, created a specification or security mechanism, generated notable research, or produced other work reducing online abuse and improving the Internet. The award comes with an honorarium provided by Return Path and M3AAWG will sponsor the winning candidate's attendance at the upcoming 26th M3AAWG General Meeting in Baltimore, Md., Oct. 23-25, where the award will be presented.

J.D. was a legend in the abuse prevention world when I first started learning about spam and abuse prevention back in the late 90's. He was one of the founding members of CAUCE and was very active in many arenas at that time. J.D. and I both worked at MAPS. He moved on to work at a number of large ISPs, including Hotmail and Yahoo. J.D. authored a number of documents for the IETF, including those relating to FBLs now in use at most of the major US ISPs.

If you know any person or team who you think deserves to be recognized for all their hard work in making the Internet a better place, you can submit nominations at the M3AAWG J.D. Falk award page.

By Laura Atkins, Founding partner of anti-spam consultancy & software firm Word to the Wise. More blog posts from Laura Atkins can also be read here.

Related topics: Malware, Security, Spam

WEEKLY WRAP — Get CircleID's Weekly Summary Report by Email:

Comments

To post comments, please login or create an account.

Related Blogs

Related News

Topics

Industry Updates – Sponsored Posts

Nominum Announces Future Ready DNS

New from Verisign Labs - Measuring Privacy Disclosures in URL Query Strings

DotConnectAfrica Delegates Attend the Kenya Internet Governance Forum

3 Questions to Ask Your DNS Host about Lowering DDoS Risks

Continuing to Work in the Public Interest

Verisign Named to the OTA's 2014 Online Trust Honor Roll

4 Minutes Vs. 4 Hours: A Responder Explains Emergency DDoS Mitigation

Dyn Acquires Internet Intelligence Company, Renesys

Tips to Address New FFIEC DDoS Requirements

Smokescreening: Data Theft Makes DDoS More Dangerous

dotStrategy Selects Neustar's Registry Threat Mitigation Services for .BUZZ Registry

24 Million Home Routers Expose ISPs to Massive DNS-Based DDoS Attacks

What Does a DDoS Attack Look Like? (Watch First 3 Minutes of an Actual Attack)

Joining Forces to Advance Protection Against Growing Diversity of DDoS Attacks

Why Managed DNS Means Secure DNS

Rodney Joffe on Why DNS Has Become a Favorite Attack Vector

Motivated to Solve Problems at Verisign

Diversity, Openness and vBSDcon 2013

Neustar's Proposal for New gTLD Collision Risk Mitigation

IT Project Management: Best Practices in Small-Scale Engagements

Sponsored Topics