Martin McKeay explained

Martin McKeay (born June 29, 1971)[1] is a United States computer security expert and blogger who works for Akamai Technologies as a Security Evangelist.[2] [3] He writes one of the most popular security blogs[4] and also a podcast called the Network Security Podcast.[5] He is a Qualified Security Assessor.[6] In 2006, he started blogging for Computer World.[7]

He was a product evangelist for StillSecure.[8]

He has been a speaker at many conferences including Hacker Halted, RSA Conference[9] and DEF CON.[10]

He is an advocate of the Payment Card Industry Data Security Standard.[11] [12] [13]

References

  1. Web site: Ep 312 – We need a warning label . Technorama . June 29, 2011.
  2. Web site: About . Network Security Blog . January 4, 2008.
  3. Brenner, Bill (July 27, 2011). "New Akamai security team in place: McKeay joins Corman, Smith, Ellis" . CSO Online.
  4. Stiennon, Richard (August 1, 2006). "Meet Martin McKeay". ZDNet.
  5. Grimes, Roger A. (August 3, 2010). "Waiting for an Internet security fix? Don't hold your breath". InfoWorld.
  6. Carr, David F. (May 17, 2010). "Taking Credit Card Security Seriously". Forbes.
  7. Jennings, Richi (January 3, 2006). "IE wails, spectrum tales (and rocket birdman)". Computer World.
  8. http://www.net-security.org/secworld.php?id=4828 "StillSecure appoints security expert and blogger Martin McKeay as a Product Evangelist"
  9. https://www.youtube.com/watch?v=uZUmuLGOirE "Why is "cloud security" so over hyped?"
  10. https://www.defcon.org/html/defcon-19/dc-19-speakers.html#PanelPCI "PCI 2.0: Still Compromising Controls and Compromising Security"
  11. http://www.imperva.com/docs/podcasts/14_pd_martin_mckeay_network_security_podcast.pdf "PCI, Security Blogging & Podcasting – an Interview with Martin McKeay – Host of the Network Security Podcast"
  12. Spark, David (March 1, 2010). "RSA 2010: Let’s stop trying to protect everything". Tripwire.
  13. Holtfreter, Robert (July/August 2006). "Latest debit card fraud schemes" . Fraud Magazine. pp. 33-53.

External links