Knowledge (XXG)

Greg Martin (entrepreneur)

Source đź“ť

34:
and the founder of the cyber security company JASK (Acquired by Sumo Logic 2019). Martin is credited with inventing the first Threat Intelligence Platform (TIP), and is the creator of the popular open source Honeypot project “Modern Honey Network”.
218: 313: 356: 376: 294: 237: 90: 86: 361: 332: 275: 199: 62:
with bogus calls and infiltrating his high school's servers, programming the computers to shut off simultaneously.
71: 123: 116: 112: 127: 366: 177:
industry resource, and is often quoted in industry news stories on a variety of topics, from high-profile
371: 164:
United States Patent 10855715 "Method for predicting security risks of assets on a computer network"
30:) is a cybersecurity expert and entrepreneur. Martin was the founder of cyber-security company 174: 59: 58:. He was a teenage computer hacker, pulling pranks like creating a program to flood the local 55: 44: 137:
Martin currently resides in Austin, TX with his family and is the CEO of Ghost Security Inc.
105: 54:, taught himself taught himself to write code on his family's first personal computer, an 51: 146: 350: 131: 178: 157:
Martin was awarded two United States patents in computer and network security:
256: 101: 93:(FBI), helping the organizations track and shut down criminal networks. 31: 333:"California's Cybersecurity task force leads charge to defeat hackers" 85:. During this time he also acted as a cyber-security advisor for the 314:"Stalled Equifax Breach Investigation Could Provide Valuable Insight" 75: 23: 219:"Open-Source Tool Aimed At Propelling Honeypots Into the Mainstream" 70:
At age 16, while still in high school, Martin ran the local dial-up
295:"Ex-FBI advisor raises $ 12 million for cybersecurity startup JASK" 161:
United States Patent 10867034 "Method for detecting a cyber attack"
27: 145:
Martin serves as an independent board director of SOC Prime Inc,
238:"'Born at the Right Time': How Kid Hackers Became Cyberwarriors" 97: 82: 96:
In 2009, Martin became a cyber-security consultant for leading
81:
In his mid-twenties, he taught a computer security course for
257:"This Startup Wants You to Know When a Cyberattack Is Coming" 16:
American cybersecurity expert and entrepreneur (born 1981)
276:"ThreatStream Renames and Refocuses Itself as Anomali" 115:
company ThreatStream Inc. (now known as Anomali), in
200:"JASK and the future of autonomous cybersecurity" 8: 74:. After graduating high school, he moved to 149:of Anomali, Inc. and Acalvio Technologies. 111:In 2012, he left HP (Arcsight) and founded 274:Kerner, Sean Michael (February 29, 2016). 255:Lachance Shandrow, Kim (March 24, 2014). 217:Jackson Higgins, Kelly (June 19, 2014). 78:, Texas, to work as a network engineer. 293:Magistretti, Bérénice (June 27, 2017). 190: 7: 312:Bradley, Tony (February 20, 2018). 331:Tesler, Rachel (August 21, 2019). 236:Schuppe, Jon (December 30, 2014). 198:Crichton, Danny (March 24, 2018). 14: 43:Martin grew up in working-class 91:Federal Bureau of Investigation 1: 357:Computer security specialists 181:to government cybersecurity. 104:(which was later acquired by 169:Commentary and contributions 393: 377:Internet service providers 50:Martin, a self proclaimed 122:In 2015, Martin launched 72:Internet service provider 117:Redwood City, California 39:Early life and education 128:artificial intelligence 173:Martin serves as a 87:U.S. Secret Service 362:People from Dallas 141:Boards and honors 45:Waxahachie, Texas 384: 341: 340: 328: 322: 321: 309: 303: 302: 290: 284: 283: 271: 265: 264: 252: 246: 245: 233: 227: 226: 214: 208: 207: 195: 130:company JASK in 392: 391: 387: 386: 385: 383: 382: 381: 347: 346: 345: 344: 330: 329: 325: 311: 310: 306: 292: 291: 287: 273: 272: 268: 254: 253: 249: 235: 234: 230: 216: 215: 211: 197: 196: 192: 187: 171: 155: 143: 106:Hewlett-Packard 68: 41: 17: 12: 11: 5: 390: 388: 380: 379: 374: 369: 364: 359: 349: 348: 343: 342: 323: 304: 285: 266: 247: 228: 209: 189: 188: 186: 183: 170: 167: 166: 165: 162: 154: 151: 147:Advisory Board 142: 139: 124:cloud security 113:cloud security 67: 64: 60:Domino's Pizza 56:IBM 8086 clone 40: 37: 22:(born 1981 in 15: 13: 10: 9: 6: 4: 3: 2: 389: 378: 375: 373: 370: 368: 367:Living people 365: 363: 360: 358: 355: 354: 352: 338: 334: 327: 324: 319: 315: 308: 305: 300: 296: 289: 286: 281: 277: 270: 267: 262: 258: 251: 248: 243: 239: 232: 229: 224: 220: 213: 210: 205: 201: 194: 191: 184: 182: 180: 179:data breaches 176: 175:cybersecurity 168: 163: 160: 159: 158: 152: 150: 148: 140: 138: 135: 133: 132:San Francisco 129: 125: 120: 118: 114: 109: 107: 103: 99: 94: 92: 88: 84: 79: 77: 73: 65: 63: 61: 57: 53: 48: 46: 38: 36: 33: 29: 25: 21: 337:Fox Business 336: 326: 317: 307: 298: 288: 279: 269: 261:Entrepreneur 260: 250: 241: 231: 223:Dark Reading 222: 212: 203: 193: 172: 156: 144: 136: 121: 110: 95: 80: 69: 49: 42: 19: 18: 372:1981 births 299:VentureBeat 20:Greg Martin 351:Categories 204:TechCrunch 185:References 52:autodidact 242:NBC News 102:ArcSight 100:company 89:and the 153:Patents 32:Anomali 318:Forbes 76:Dallas 66:Career 24:Dallas 280:eWeek 28:Texas 126:and 98:SIEM 83:NASA 134:. 108:). 353:: 335:. 316:. 297:. 278:. 259:. 240:. 221:. 202:. 119:. 47:. 26:, 339:. 320:. 301:. 282:. 263:. 244:. 225:. 206:.

Index

Dallas
Texas
Anomali
Waxahachie, Texas
autodidact
IBM 8086 clone
Domino's Pizza
Internet service provider
Dallas
NASA
U.S. Secret Service
Federal Bureau of Investigation
SIEM
ArcSight
Hewlett-Packard
cloud security
Redwood City, California
cloud security
artificial intelligence
San Francisco
Advisory Board
cybersecurity
data breaches
"JASK and the future of autonomous cybersecurity"
"Open-Source Tool Aimed At Propelling Honeypots Into the Mainstream"
"'Born at the Right Time': How Kid Hackers Became Cyberwarriors"
"This Startup Wants You to Know When a Cyberattack Is Coming"
"ThreatStream Renames and Refocuses Itself as Anomali"
"Ex-FBI advisor raises $ 12 million for cybersecurity startup JASK"
"Stalled Equifax Breach Investigation Could Provide Valuable Insight"

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑