Martin McKeay

Last updated

Martin McKeay (born June 29, 1971) [1] is a United States computer security expert and blogger who works for Akamai Technologies as a Security Evangelist. [2] [3] He writes one of the most popular security blogs [4] and also a podcast called the Network Security Podcast. [5] He is a Qualified Security Assessor. [6] In 2006, he started blogging for Computer World. [7]

He was a product evangelist for StillSecure. [8]

He has been a speaker at many conferences including Hacker Halted, RSA Conference [9] and DEF CON. [10]

He is an advocate of the Payment Card Industry Data Security Standard. [11] [12] [13]

Related Research Articles

<span class="mw-page-title-main">Dave Winer</span> American software developer, entrepreneur, and writer

Dave Winer is an American software developer, entrepreneur, and writer who resides in New York City. Winer is noted for his contributions to outliners, scripting, content management, and web services, as well as blogging and podcasting. He is the founder of the software companies Living Videotext, Userland Software and Small Picture Inc., a former contributing editor for the Web magazine HotWired, the author of the Scripting News weblog, a former research fellow at Harvard Law School, and current visiting scholar at New York University's Arthur L. Carter Journalism Institute.

<span class="mw-page-title-main">Blog</span> Discussion or informational site published on the internet

A blog is an informational website consisting of discrete, often informal diary-style text entries (posts). Posts are typically displayed in reverse chronological order so that the most recent post appears first, at the top of the web page. In the 2000s, blogs were often the work of a single individual, occasionally of a small group, and often covered a single subject or topic. In the 2010s, "multi-author blogs" (MABs) emerged, featuring the writing of multiple authors and sometimes professionally edited. MABs from newspapers, other media outlets, universities, think tanks, advocacy groups, and similar institutions account for an increasing quantity of blog traffic. The rise of Twitter and other "microblogging" systems helps integrate MABs and single-author blogs into the news media. Blog can also be used as a verb, meaning to maintain or add content to a blog.

<span class="mw-page-title-main">Bruce Schneier</span> American computer scientist (born 1963)

Bruce Schneier is an American cryptographer, computer security professional, privacy specialist, and writer. Schneier is an Adjunct Lecturer in Public Policy at the Harvard Kennedy School and a Fellow at the Berkman Klein Center for Internet & Society as of November, 2013. He is a board member of the Electronic Frontier Foundation, Access Now, and The Tor Project; and an advisory board member of Electronic Privacy Information Center and VerifiedVoting.org. He is the author of several books on general security topics, computer security and cryptography and is a squid enthusiast.

RSA SecurID, formerly referred to as SecurID, is a mechanism developed by RSA for performing two-factor authentication for a user to a network resource.

The blogosphere is made up of all blogs and their interconnections. The term implies that blogs exist together as a connected community or as a social networking service in which everyday authors can publish their opinions and views.

An anonymous P2P communication system is a peer-to-peer distributed application in which the nodes, which are used to share resources, or participants are anonymous or pseudonymous. Anonymity of participants is usually achieved by special routing overlay networks that hide the physical location of each node from other participants.

<span class="mw-page-title-main">Akamai Technologies</span> American computer networking company

Akamai Technologies, Inc. is an American delivery company that provides content delivery network (CDN), cybersecurity, DDoS mitigation, and cloud services. Headquartered in Cambridge, Massachusetts, it operates a worldwide network of servers whose capacity it rents to customers running websites and other web services, with the goal of providing end users with greater speed and availability via Akamai-owned servers located closer to them.

BloggerCon was a user-focused conference for the blogger community that ran between 2003 and 2006. BloggerCon I and II, were organized by Dave Winer and friends at Harvard Law School's Berkman Center for the Internet and Society in Cambridge, Massachusetts BloggerCon III took place in San Francisco in June 2006. According to the Online Journalism Review, "BloggerCon has lots of cooks, but the chief chef is technologist Dave Winer, co-founder of RSS and the patient zero of blogging. BloggerCon exists because Winer wants it to happen."

A vlog, also known as a video blog or video log, is a form of blog for which the medium is video. Vlog entries often combine embedded video with supporting text, images, and other metadata. Entries can be recorded in one take or cut into multiple parts. Unlike a more general video diary, vlogs are often recorded depicting the maker throughout.

A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or evaluation of a system weaknesses to assist in formulating defenses against potential hackers.

Anton Chuvakin is a computer security specialist, currently at Google Cloud Office of the CISO. He was formerly a Research VP at Gartner for Technical Professionals (GTP) Security and Risk Management Strategies (SRMS) team. Formerly he was a principal at Security Warrior Consulting. Previous positions included roles of a Director of PCI Compliance Solutions at Qualys, a U.S. Vulnerability management company, a Chief Logging Evangelist with LogLogic, a U.S. Log Management and Intelligence company and a Security Strategist with netForensics, a U.S. Security information management company.

Brian Krebs is an American journalist and investigative reporter. He is best known for his coverage of profit-seeking cybercriminals. Krebs is the author of a daily blog, KrebsOnSecurity.com, covering computer security and cybercrime. From 1995 to 2009, Krebs was a reporter for The Washington Post and covered tech policy, privacy and computer security as well as authoring the Security Fix blog.

The Payment Card Industry Data Security Standard is an information security standard used to handle credit cards from major card brands. The standard is administered by the Payment Card Industry Security Standards Council, and its use is mandated by the card brands. It was created to better control cardholder data and reduce credit card fraud. Validation of compliance is performed annually or quarterly with a method suited to the volume of transactions:

<span class="mw-page-title-main">Jeff Moss (hacker)</span> American computer security expert (born 1975)

Jeff Moss, also known as Dark Tangent, is an American hacker, computer and internet security expert who founded the Black Hat and DEF CON computer security conferences.

Mobile blogging is a method of publishing to a website or blog from a mobile phone or other handheld device. A moblog helps habitual bloggers to post write-ups directly from their phones even when on the move. Mobile blogging has been made possible by technological convergence, as bloggers have been able to write, record and upload different media all from a single, mobile device. At the height of its growth in 2006, mobile blogging experienced 70,000 blog creations a day and 29,100 blog posts an hour. Between 2006 and 2010, blogging among teens declined from 28% to 14%, while blogging among adults over 30 increased from 7% to 11%. However, the growing number of multi-platform blogging apps has increased mobile blogging popularity in recent years creating a brand new market that many celebrities, regular bloggers and specialists are utilizing to widen their social reach.

The 2011 PlayStation Network outage was the result of an "external intrusion" on Sony's PlayStation Network and Qriocity services, in which personal details from approximately 77 million accounts were compromised and prevented users of PlayStation 3 and PlayStation Portable consoles from accessing the service. The attack occurred between April 17 and April 19, 2011, forcing Sony to deactivate the PlayStation Network servers on April 20. The outage lasted 23 days.

An anonymous blog is a blog without any acknowledged author or contributor. Anonymous bloggers may achieve anonymity through the simple use of a pseudonym, or through more sophisticated techniques such as layered encryption routing, manipulation of post dates, or posting only from publicly accessible computers. Motivations for posting anonymously include a desire for privacy or fear of retribution by an employer, a government, or another group.

Markus Jakobsson is a computer security researcher, entrepreneur and writer, whose work is focused on the issue of digital security.

<span class="mw-page-title-main">Igor Muttik</span> Russian computer scientist (born 1962)

Igor Muttik is a computer security expert, researcher and inventor.

<span class="mw-page-title-main">Iftach Ian Amit</span> Israeli Hacker

Iftach Ian Amit is an Israeli Hacker/computer security researcher and practitioner. He is one of the co-founders of the Tel Aviv DEF CON Group DC9723, the Penetration Testing Execution Standard, and presented at hacker conventions such as DEF CON, Black Hat, BlueHat, RSA Conference. He has been named SC Magazine's top experts and featured at Narratively's cover piece on Attack of the Superhackers and is frequently quoted and interviewed

References

  1. "Ep 312 – We need a warning label". Technorama. June 29, 2011.
  2. "About". Network Security Blog. January 4, 2008.
  3. Brenner, Bill (July 27, 2011). "New Akamai security team in place: McKeay joins Corman, Smith, Ellis" Archived 2012-07-11 at archive.today . CSO Online.
  4. Stiennon, Richard (August 1, 2006). "Meet Martin McKeay". ZDNet.
  5. Grimes, Roger A. (August 3, 2010). "Waiting for an Internet security fix? Don't hold your breath". InfoWorld.
  6. Carr, David F. (May 17, 2010). "Taking Credit Card Security Seriously". Forbes .
  7. Jennings, Richi (January 3, 2006). "IE wails, spectrum tales (and rocket birdman)". Computer World.
  8. "StillSecure appoints security expert and blogger Martin McKeay as a Product Evangelist". Help Net Security. February 27, 2007.
  9. "Why is "cloud security" so over hyped?". Tripwire (on YouTube). February 15, 2011.
  10. "PCI 2.0: Still Compromising Controls and Compromising Security". DEF CON 19. Retrieved May 8, 2013.
  11. "PCI, Security Blogging & Podcasting – an Interview with Martin McKeay – Host of the Network Security Podcast" Archived 2012-05-10 at the Wayback Machine . Imperva Security Podcast Transcript. 2009.
  12. Spark, David (March 1, 2010). "RSA 2010: Let’s stop trying to protect everything". Tripwire.
  13. Holtfreter, Robert (July/August 2006). "Latest debit card fraud schemes" Archived 2010-06-20 at the Wayback Machine . Fraud Magazine. pp. 33-53.