34:
and the founder of the cyber security company JASK (Acquired by Sumo Logic 2019). Martin is credited with inventing the first Threat
Intelligence Platform (TIP), and is the creator of the popular open source Honeypot project “Modern Honey Network”.
218:
313:
356:
376:
294:
237:
90:
86:
361:
332:
275:
199:
62:
with bogus calls and infiltrating his high school's servers, programming the computers to shut off simultaneously.
71:
123:
116:
112:
127:
366:
177:
industry resource, and is often quoted in industry news stories on a variety of topics, from high-profile
371:
164:
United States Patent 10855715 "Method for predicting security risks of assets on a computer network"
30:) is a cybersecurity expert and entrepreneur. Martin was the founder of cyber-security company
174:
59:
58:. He was a teenage computer hacker, pulling pranks like creating a program to flood the local
55:
44:
137:
Martin currently resides in Austin, TX with his family and is the CEO of Ghost
Security Inc.
105:
54:, taught himself taught himself to write code on his family's first personal computer, an
51:
146:
350:
131:
178:
157:
Martin was awarded two United States patents in computer and network security:
256:
101:
93:(FBI), helping the organizations track and shut down criminal networks.
31:
333:"California's Cybersecurity task force leads charge to defeat hackers"
85:. During this time he also acted as a cyber-security advisor for the
314:"Stalled Equifax Breach Investigation Could Provide Valuable Insight"
75:
23:
219:"Open-Source Tool Aimed At Propelling Honeypots Into the Mainstream"
70:
At age 16, while still in high school, Martin ran the local dial-up
295:"Ex-FBI advisor raises $ 12 million for cybersecurity startup JASK"
161:
United States Patent 10867034 "Method for detecting a cyber attack"
27:
145:
Martin serves as an independent board director of SOC Prime Inc,
238:"'Born at the Right Time': How Kid Hackers Became Cyberwarriors"
97:
82:
96:
In 2009, Martin became a cyber-security consultant for leading
81:
In his mid-twenties, he taught a computer security course for
257:"This Startup Wants You to Know When a Cyberattack Is Coming"
16:
American cybersecurity expert and entrepreneur (born 1981)
276:"ThreatStream Renames and Refocuses Itself as Anomali"
115:
company ThreatStream Inc. (now known as
Anomali), in
200:"JASK and the future of autonomous cybersecurity"
8:
74:. After graduating high school, he moved to
149:of Anomali, Inc. and Acalvio Technologies.
111:In 2012, he left HP (Arcsight) and founded
274:Kerner, Sean Michael (February 29, 2016).
255:Lachance Shandrow, Kim (March 24, 2014).
217:Jackson Higgins, Kelly (June 19, 2014).
78:, Texas, to work as a network engineer.
293:Magistretti, Bérénice (June 27, 2017).
190:
7:
312:Bradley, Tony (February 20, 2018).
331:Tesler, Rachel (August 21, 2019).
236:Schuppe, Jon (December 30, 2014).
198:Crichton, Danny (March 24, 2018).
14:
43:Martin grew up in working-class
91:Federal Bureau of Investigation
1:
357:Computer security specialists
181:to government cybersecurity.
104:(which was later acquired by
169:Commentary and contributions
393:
377:Internet service providers
50:Martin, a self proclaimed
122:In 2015, Martin launched
72:Internet service provider
117:Redwood City, California
39:Early life and education
128:artificial intelligence
173:Martin serves as a
87:U.S. Secret Service
362:People from Dallas
141:Boards and honors
45:Waxahachie, Texas
384:
341:
340:
328:
322:
321:
309:
303:
302:
290:
284:
283:
271:
265:
264:
252:
246:
245:
233:
227:
226:
214:
208:
207:
195:
130:company JASK in
392:
391:
387:
386:
385:
383:
382:
381:
347:
346:
345:
344:
330:
329:
325:
311:
310:
306:
292:
291:
287:
273:
272:
268:
254:
253:
249:
235:
234:
230:
216:
215:
211:
197:
196:
192:
187:
171:
155:
143:
106:Hewlett-Packard
68:
41:
17:
12:
11:
5:
390:
388:
380:
379:
374:
369:
364:
359:
349:
348:
343:
342:
323:
304:
285:
266:
247:
228:
209:
189:
188:
186:
183:
170:
167:
166:
165:
162:
154:
151:
147:Advisory Board
142:
139:
124:cloud security
113:cloud security
67:
64:
60:Domino's Pizza
56:IBM 8086 clone
40:
37:
22:(born 1981 in
15:
13:
10:
9:
6:
4:
3:
2:
389:
378:
375:
373:
370:
368:
367:Living people
365:
363:
360:
358:
355:
354:
352:
338:
334:
327:
324:
319:
315:
308:
305:
300:
296:
289:
286:
281:
277:
270:
267:
262:
258:
251:
248:
243:
239:
232:
229:
224:
220:
213:
210:
205:
201:
194:
191:
184:
182:
180:
179:data breaches
176:
175:cybersecurity
168:
163:
160:
159:
158:
152:
150:
148:
140:
138:
135:
133:
132:San Francisco
129:
125:
120:
118:
114:
109:
107:
103:
99:
94:
92:
88:
84:
79:
77:
73:
65:
63:
61:
57:
53:
48:
46:
38:
36:
33:
29:
25:
21:
337:Fox Business
336:
326:
317:
307:
298:
288:
279:
269:
261:Entrepreneur
260:
250:
241:
231:
223:Dark Reading
222:
212:
203:
193:
172:
156:
144:
136:
121:
110:
95:
80:
69:
49:
42:
19:
18:
372:1981 births
299:VentureBeat
20:Greg Martin
351:Categories
204:TechCrunch
185:References
52:autodidact
242:NBC News
102:ArcSight
100:company
89:and the
153:Patents
32:Anomali
318:Forbes
76:Dallas
66:Career
24:Dallas
280:eWeek
28:Texas
126:and
98:SIEM
83:NASA
134:.
108:).
353::
335:.
316:.
297:.
278:.
259:.
240:.
221:.
202:.
119:.
47:.
26:,
339:.
320:.
301:.
282:.
263:.
244:.
225:.
206:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.