Greg Martin (born 1981 in Dallas, Texas) is a cybersecurity expert and entrepreneur. Martin was the founder of cyber-security company Anomali and the founder of the cyber security company JASK (Acquired by Sumo Logic 2019). Martin is credited with inventing the first Threat Intelligence Platform (TIP),[1] and is the creator of the popular open source Honeypot project “Modern Honey Network”.[2]
Martin grew up in working-class Waxahachie, Texas.
Martin, a self proclaimed autodidact, taught himself taught himself to write code on his family's first personal computer, an IBM 8086 clone. He was a teenage computer hacker, pulling pranks like creating a program to flood the local Domino's Pizza with bogus calls and infiltrating his high school's servers, programming the computers to shut off simultaneously.[3]
At age 16, while still in high school, Martin ran the local dial-up Internet service provider. After graduating high school, he moved to Dallas, Texas, to work as a network engineer.
In his mid-twenties, he taught a computer security course for NASA. During this time he also acted as a cyber-security advisor for the U.S. Secret Service and the Federal Bureau of Investigation (FBI), helping the organizations track and shut down criminal networks.[4]
In 2009, Martin became a cyber-security consultant for leading SIEM company ArcSight (which was later acquired by Hewlett-Packard).
In 2012, he left HP (Arcsight) and founded cloud security company ThreatStream Inc. (now known as Anomali),[5] in Redwood City, California.
In 2015, Martin launched cloud security and artificial intelligence company JASK[6] in San Francisco.
Martin currently resides in Austin, TX with his family and is the CEO of Ghost Security Inc.
Martin serves as an independent board director of SOC Prime Inc, Advisory Board of Anomali, Inc. and Acalvio Technologies.
Martin was awarded two United States patents in computer and network security:
Martin serves as a cybersecurity industry resource, and is often quoted in industry news stories on a variety of topics, from high-profile data breaches[7] to government cybersecurity.[8]