Tony Martin-Vegue is a 20-year technology industry veteran who started out as a Windows 3.1 phone support technician and worked his way up by running network cabling through ceilings, winning (and losing) in the late-1990s - early 2000s dot-com bubble and leading network operations teams. In the more recent past, Tony has worked in the financial services sector helping firms establish frameworks for enterprise risk assessments, developed advanced threat modeling tools, educated on risk analysis techniques and consulted on security for large-scale IT projects. Tony currently works at a large global retailer leading their cyber-crime program by researching emerging threats, assessing risk and fighting fraud.
Tony holds a Bachelor of Science in Business Economics from the University of San Francisco and holds many certifications including CISSP, CISM and CEH.
Tony lives in the San Francisco Bay Area, is a father of two and enjoys swimming and biking in his free time.
The opinions expressed in this blog are those of Tony Martin-Vegue and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.
Despite the recent arrest of a member of DD4BC, all signs point to a continuation of DDoS extortion attacks. The vast majority of victims do not pay the ransom and choose to wait it out or strengthen their countermeasures, but just enough websites pa...
Attacking the implementation of a cryptographic algorithm can be much easier than attacking the algorithm itself
Misunderstanding these important tools can put your company at risk – and cost you a lot of money
The three top presentations from the annual security conference
A subtle, but significant, cyber war has been occurring for the last year in the conflict between Russia and Ukraine
Conquer your fear of networking and maximize your experience at the RSA conference
An in-depth of examination of the terms “cyber war,” “cyber terrorism,” “cyber vandalism” and “cyber espionage”
Cutting through the noise to understand what a “cyber attack” and “cyberspace” really mean