23 Posts

Martin McKeay

Security Advocate

Martin McKeay is a Senior Security Advocate at Akamai, joining the company in 2011. As a member of Akamai's Security Intelligence Team, he is responsible for researching security threats, customer education and industry intelligence. With over fifteen years of experience in the security space and five years of direct Payment Card Industry work, Martin has provided expertise to hundreds of companies. He is also the author of the Network Security Blog and host of the Network Security Podcast.

Written By Martin McKeay

Career Growth: The Need to Learn

Career growth within the security industry comes from professionals constantly striving to learn about new tools, technologies and strategies.

The Five Most Interesting Talks at Black Hat, DEF CON and BSides

This year's lineup of talks at the Black Hat, DEF CON and BSides conferences was particularly interesting. Here are five of the hottest topics from Vegas.

What Happens in Vegas: Taking the ‘Hallway Track’ at a Security Conference

If you're heading to a security conference in Las Vegas, you should know how to make the most of your time and how to master the infamous "Hallway Track."

DDoS Extortion: Easy and Lucrative

Distributed denial-of-service (DDoS) attacks can vex organizations in a number of ways. Learn how to secure your networks and respond appropriately.

BSides London: For the Community, by the Community

Members of the security community will descend upon London for the fifth annual BSides conference, which is an alternative to many large corporate events.

Your Encryption Keys, Your Kingdom

Do you know who has access to the keys that encrypt your data? How to keep and control access of your keys when using a third-party source.

Failure to Plan Is a Plan for Failure When It Comes to Security

With major security events happening in 2014, including Heartbleed and Sony's hack, what can companies do to plan ahead and protect themselves from hacks.

Start 2015 Right, Take Inventory

With a new year, it's time to take inventory of your network and systems to ensure everything is secured properly to mitigate security hacks.

Where Will the Next Generation of Security Professionals Come From?

There are a lack of students joining the security profession and with an increase in vullnerabilities, threats and attacks, what will happen?

Data Classification: Crown Jewels or Costume Jewelry?

Businesses often treat the crown jewels of their enterprise with the same level of security as everything else in their organization.