M3AAWG’s Chairperson of the Board of Directors, Sara Roper, provides an overview of the new User & Endpoint Priority as a key organizational focal point in the latest M3AAWG5 video series chat this week.
As part of a strategic evolution in Priorities, M3AAWG has outlined four core priorities that reflect how abuse operates across layers, platforms, and people. In addition to User & Endpoint, these priorities include
- Communications & Content.
- Platform & Infrastructure.
- Policy & Regulations. (Stay tuned as this will be the subject of next week’s M3AAWG5 discussion!)
“User and Endpoint is about what happens when abuse lands—when it reaches people, devices, and systems at the edge of a network. This priority focuses on where abuse is experienced, where it exploits trust, and where the impact becomes personal,” Sara said.
M3AAWG’s focus on User and Endpoint recognizes that bad actors target people through the devices, systems, and apps they rely on. It’s where harm is delivered and the consequences begin. Examples within the scope of this priority include:
- Detecting and managing abuse across encrypted and/or proprietary environments.
- DDoS command and control, amplification, and other DNS attacks.
- Phishing tactics including QR codes, push notifications, and other mobile vectors.
- Spoofing and fraud through biometric, authentication, and other novel techniques.
- Device-centric credential threats: SIM swapping, MFA bypass, etc.
“If your work touches on authentication systems, device-based access, mobile platform abuse, trust and safety, or user-focused fraud defense, this Priority intersects with you,” added Sara.
In recent weeks, this M3AAWG5 video series has also covered CLARITY, detailing how it serves as a symbol of M3AAWG’s newly outlined values.