Jan 04 2008


Published by

My name is Martin McKeay, and I started blogging about security in August of 2003. I was in a job where I had plenty of free time and SSH access to my home servers. I took up blogging as a means to extend my knowledge and test my ideas about security by putting them up for peer review.  Ten years later and I’m still at it, so I must be doing something right.  I write to learn; the act of putting words to the blog helps crystallize my thinking and discovers the weak points in my ideas and philosophies.  Letting others beat on those ideas either strengthens them or destroys the ones that had no merit to start with.

I live near London, England (recent transplant from Northern California) with a lovely wife and two intelligent, if challenging, young boys. I work for Akamai as a Security Advocate, helping to explain how Akamai secures itself and talking about security through out Europe. Until recently, I had a fairly regular podcast co-hosted by none other than Rich Mogull, Mr. Securosis himself and Zach Lanier from N0Where.org . The opinions stated in this blog are my own and in no way reflect the views and opinions of my employer.

I can usually be reached via cell at 707.327.2541, or you can send me an email at martin at mckeay dot net.  I’m always willing to be interviewed or asked for comment on stories, the best way to reach me for an interview is via email.


Photo by Thomas Hawk, CEO of Zooomr


This blog is published under the Creative Commons Attribution 3.0 license. The content is free to be republished provided you give attribution to this site, as http://www.mckeay.net and it’s author, Martin McKeay.

Network Security Blog by Martin McKeay is licensed under a Creative Commons Attribution 3.0 United States License. Based on a work at www.mckeay.net.

Creative Commons License

[Slashdot] [Digg] [Reddit] [del.icio.us] [Facebook] [Technorati] [Google] [StumbleUpon]

7 responses so far

7 Responses to “About”

  1. Don 12 Jan 2008 at 10:43 am

    Love the podcast.

    Was playing around with google and searched for



    Index of /secureIndex of /secure. Parent Directory. Apache/2.2.6 (Unix) mod_ssl/2.2.6 OpenSSL/0.9.8g DAV/2 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/ …
    http://www.mckeay.net/secure/ – 1k – Cached – Similar pages

    Just thought I’d let you know….

    P.S. Love the different music choices. Also Dualcore is suppose to have another CD out soon.

  2. Majikon 08 Feb 2008 at 10:31 am

    Your comment on the Societe Generale control failure is less than enlightening. You say

    “…I don’t see how this could have been avoided,”

    Are you just pulling our collective legs out here, or is that what you really think?

    How about this?

    1. Two factor authentication with hard security tokens (or biometrics), vastly reducing the risk of “stolen passwords” and/or “misappropriated the IT access codes”.

    2. Daily (hourly) review of the overall risk position of the organization fed back to management directly from public sources, alarmed to specific limits.

    I challenge you to demonstrate that these simple controls would not have prevented this catastrophe.

  3. […] About […]

  4. Andreas Haugsneson 20 Feb 2008 at 6:58 pm

    Nice picture.

  5. David Scotton 03 Jun 2008 at 8:46 am

    Agree with Majik. Statements of inevitability are a conceded loss to failure. Only a belief that bad outcomes are preventable leads to sustained and new efforts of prevention. – David Scott, author – I.T. Wars: Managing the Business-Technology Weave in the New Millennium.

  6. Tony Costaon 03 Jun 2008 at 11:34 am

    Sallie Goestch introduce me to you.

    I do preside a regional chapter for NAISG which is a non profit infosec user group.

    My chapter is in NYC.

    I am recruiting guest speakers, and assuming you travel to East Coast I wonder if you might be interest to be a guest speaker in one of our sponsored monthly meetings.

    You can call me at my wireless for that purpose


  7. Raakhee mistryon 25 Nov 2008 at 11:24 pm

    Hello –

    We’d like to let the Linux developer community know about a worldwide developer contest sponsored by Cisco Systems, and request your assistance to post this information on your blog. This contest is challenging the developer community to build innovative applications that promote better network and application integration. Cash prizes total US$100,000.

    In 2008, Cisco introduced the Cisco Application Extension Platform (AXP), a Linux-based application hosting environment that physically resides on the Cisco router. AXP enables programmers to develop in many popular programming languages including C, C++, Python, Perl, and Java and tightly couple applications with the network through the use of Cisco IOS software integration APIs. We feel application visibility to the network can improve the user experience by allowing applications to respond appropriately based on the network state.

    Cisco Developer Contest Details
    The contest is open to entrants worldwide who are over 18 years old. No purchase necessary. The contest will consist of two phases:

    Phase 1: Proposal submission based on a template provided by Cisco. This phase will end on January 12th 2009. At that time, up to 10 proposals will be shortlisted and will enter Phase 2. Contestants can preview the AXP environment through VMware players at: http://developer.cisco.com/web/axp/docs

    Phase 2: The finalists will be asked to develop a prototype of their proposed application using the Cisco Application Extension Platform (AXP) within 90 days, with the router hardware, AXP service module and the development environment being provided by Cisco. At the end of this phase, the developers of the selected top 3 applications will receive U.S. $50,000, U.S. $30,000 and U.S. $20,000 respectively.

    How do developers enter the contest?
    Developers can register for the contest and start submitting proposals by January 12, 2009 at http://www.cisco.com/go/thinkinside

    Reach us at ask-devcontest@cisco.com. Alternatively, blog your question or comment at http://blogs.cisco.com/innovation


%d bloggers like this: