Gary McGraw: Difference between revisions
No edit summary |
|||
(10 intermediate revisions by 10 users not shown) | |||
Line 1: | Line 1: | ||
'''Gary McGraw''' is an American computer scientist, author, and researcher.{{Infobox person|name = Gary McGraw|alma_mater = PhD, Cognitive Science and Computer Science - Indiana University |
'''Gary McGraw''' is an American computer scientist, author, and researcher.{{Infobox person|name = Gary McGraw|alma_mater = PhD, Cognitive Science and Computer Science - Indiana University |
||
B.A. Philosophy - University of Virginia|title = |
B.A. Philosophy - University of Virginia|title = Vice President of Security Technology at Synopsys, Inc.}} |
||
GARY MCGRAW is and always will be, a legend. He is very smart and loyal. Gary is also related to Ed Burns |
|||
== Education == |
== Education == |
||
McGraw holds a dual PhD in Cognitive Science and Computer Science from Indiana University |
McGraw holds a dual PhD in Cognitive Science and Computer Science from Indiana University and a BA in Philosophy from the University of Virginia.<ref>{{Cite web|title = The University of Virginia|url = http://www.virginia.edu/|website = www.virginia.edu|accessdate = 2015-10-02}}</ref> His doctoral dissertation is titled "Letter Spirit: Emergent High-Level Perception of Letters Using Fluid Concepts."<ref>{{Cite web|url = http://www.cogsci.indiana.edu/farg/mcgrawg/thesis.html|title = Indiana University, Bloomington IN|date = 1995|access-date = 2 October 2015|website = Indiana University|publisher = The Center for Research on Concepts and Cognition|last = McGraw|first = Gary|archive-url = https://web.archive.org/web/20150910190125/http://www.cogsci.indiana.edu/farg/mcgrawg/thesis.html|archive-date = 10 September 2015|url-status = dead}}</ref> |
||
== Career == |
== Career == |
||
McGraw was the Vice President of Security Technology at [[Synopsys]].<ref>{{cite web |url=https://www.synopsys.com/blogs/software-security/author/gem/ |title=Software Security Expert Opinion {{pipe}} Gary McGraw |access-date=December 21, 2017}}</ref> Before [[Cigital]] was acquired by Synopsys, he was Chief Technical Officer at Cigital.<ref>{{cite news |
|||
McGraw is the Chief Technical Officer at [[Cigital|Cigital Inc.]]<ref>{{cite news |
|||
|newspaper=CNet |
|newspaper=CNet |
||
|date=2010-05-12 |
|date=2010-05-12 |
||
Line 12: | Line 12: | ||
|first=Elinor |
|first=Elinor |
||
|last=Mills |
|last=Mills |
||
|url=http://news.cnet.com/8301-27080_3-20004743-245.html}}</ref> |
|url=http://news.cnet.com/8301-27080_3-20004743-245.html}}</ref> He produced the ''Silver Bullet Security Podcast'' for IEEE ''Security & Privacy magazine'' (syndicated by informIT). |
||
<ref>{{cite news |
<ref>{{cite news |
||
|newspaper=InformIT |
|newspaper=InformIT |
||
Line 22: | Line 22: | ||
|date=2010-12-29 |
|date=2010-12-29 |
||
|url=http://www.informit.com/articles/article.aspx?p=1671924}} |
|url=http://www.informit.com/articles/article.aspx?p=1671924}} |
||
</ref> Gary McGraw serves on the |
</ref> Gary McGraw serves on the Dean's Advisory Council for the School of Informatics of Indiana University. He also serves on the advisory boards of several companies,<ref>{{Cite web|title = Business|url = https://www.cigital.com/gem/business/|website = www.cigital.com|accessdate = 2015-10-02}}</ref> including [[Dasient]] (acquired by Twitter), [[Fortify Software]] (acquired by Hewlett-Packard), Max Financial, Invotas, Wall+Main, [[Invincea]] (acquired by Sophos), and Raven White. In the past, Gary McGraw has served on the [[IEEE Computer Society]] Board of Governors.{{Citation needed|date=November 2013}} |
||
==Books== |
==Books== |
||
Gary is an author of many books and over 100 [[peer-reviewed]] publications on IT security. |
Gary is an author of many books and over 100 [[peer-reviewed]] publications on IT security. |
||
* Software Security: Building Security In, ISBN |
* Software Security: Building Security In, {{ISBN|978-0-321-35670-3}} |
||
* Exploiting Software: How to Break Code (with [[Greg Hoglund]]), ISBN |
* Exploiting Software: How to Break Code (with [[Greg Hoglund]]), {{ISBN|978-0-201-78695-8}} |
||
* Building Secure Software: How to Avoid Security Problems the Right Way (with [[John Viega]]), ISBN |
* Building Secure Software: How to Avoid Security Problems the Right Way (with [[John Viega]]), {{ISBN|978-0-321-77495-8}} |
||
* Java Security (with [[Edward Felten]]), ISBN |
* Java Security (with [[Edward Felten]]), {{ISBN|978-0-471-17842-2}} |
||
* Exploiting Online Games: Cheating Massively Distributed Systems (with Greg Hoglund), ISBN |
* Exploiting Online Games: Cheating Massively Distributed Systems (with Greg Hoglund), {{ISBN|978-0-13-227191-2}} |
||
* Software Security Engineering: A Guide for Project Managers (with Julia H. Allen, Sean J. Barnum, Robert J. Ellison, and Nancy R. Mead) ISBN |
* Software Security Engineering: A Guide for Project Managers (with Julia H. Allen, Sean J. Barnum, Robert J. Ellison, and Nancy R. Mead) {{ISBN|978-0-321-50917-8}} |
||
* Software Fault Injection (with Jeffrey M. Voas) ISBN |
* Software Fault Injection (with Jeffrey M. Voas) {{ISBN|978-0-471-18381-5}} |
||
* Securing Java: Getting Down to Business with Mobile Code (with Edward Felten), ISBN |
* Securing Java: Getting Down to Business with Mobile Code (with Edward Felten), {{ISBN|978-0-471-31952-8}} |
||
== |
==Notes== |
||
{{reflist}} |
{{reflist}} |
||
==References== |
|||
*Ben Rothke. [http://www.securitymanagement.com/article/software-security-building-security "Software Security: Building Security In"], ''Security Management'' magazine |
*Ben Rothke. [http://www.securitymanagement.com/article/software-security-building-security "Software Security: Building Security In"], ''Security Management'' magazine |
||
*Radu State. [http://queue.acm.org/detail.cfm?id=1160452 Review of "Software Security: Building Security In by Gary McGraw"], ''[[ACM Queue]]'' 4(7):44 (2006) |
*Radu State. [http://queue.acm.org/detail.cfm?id=1160452 Review of "Software Security: Building Security In by Gary McGraw"], ''[[ACM Queue]]'' 4(7):44 (2006) |
||
*[http://palizine.plynt.com/issues/2006Feb/review/ "Software Security : Building Security In"], ''Palizine'', Issue #18 February 2006 |
*[https://web.archive.org/web/20120717193759/http://palizine.plynt.com/issues/2006Feb/review/ "Software Security : Building Security In"], ''Palizine'', Issue #18 February 2006 |
||
*Robert Bruen. [http://www.ieee-security.org/Cipher/BookReviews/2006/McGraw_E70_by_bruen.html "Software Security. Building Security In"], [http://www.ieee-security.org/cipher.html ''Cipher''] ([[IEEE]] magazine), Jan 5, 2006 |
*Robert Bruen. [http://www.ieee-security.org/Cipher/BookReviews/2006/McGraw_E70_by_bruen.html "Software Security. Building Security In"], [http://www.ieee-security.org/cipher.html ''Cipher''] ([[IEEE]] magazine), Jan 5, 2006 |
||
*Alen Prodan. [http://www.net-security.org/review.php?id=134 "Exploiting Software: How to Break Code"], Help Net Security, 21 July 2004 |
*Alen Prodan. [http://www.net-security.org/review.php?id=134 "Exploiting Software: How to Break Code"], Help Net Security, 21 July 2004 |
||
Line 49: | Line 51: | ||
==External links== |
==External links== |
||
* [ |
* [https://www.garymcgraw.com/ Gary McGraw's personal home page] |
||
{{Authority control}} |
{{Authority control}} |
||
Line 57: | Line 59: | ||
[[Category:Living people]] |
[[Category:Living people]] |
||
[[Category:American technology writers]] |
[[Category:American technology writers]] |
||
[[Category: |
[[Category:Writers about computer security]] |
||
[[Category:Indiana University alumni]] |
[[Category:Indiana University alumni]] |
||
[[Category:University of Virginia alumni]] |
[[Category:University of Virginia alumni]] |
Latest revision as of 19:09, 20 October 2021
Gary McGraw is an American computer scientist, author, and researcher.
Gary McGraw | |
---|---|
Alma mater | PhD, Cognitive Science and Computer Science - Indiana University B.A. Philosophy - University of Virginia |
Title | Vice President of Security Technology at Synopsys, Inc. |
Education
[edit]McGraw holds a dual PhD in Cognitive Science and Computer Science from Indiana University and a BA in Philosophy from the University of Virginia.[1] His doctoral dissertation is titled "Letter Spirit: Emergent High-Level Perception of Letters Using Fluid Concepts."[2]
Career
[edit]McGraw was the Vice President of Security Technology at Synopsys.[3] Before Cigital was acquired by Synopsys, he was Chief Technical Officer at Cigital.[4] He produced the Silver Bullet Security Podcast for IEEE Security & Privacy magazine (syndicated by informIT). [5] Gary McGraw serves on the Dean's Advisory Council for the School of Informatics of Indiana University. He also serves on the advisory boards of several companies,[6] including Dasient (acquired by Twitter), Fortify Software (acquired by Hewlett-Packard), Max Financial, Invotas, Wall+Main, Invincea (acquired by Sophos), and Raven White. In the past, Gary McGraw has served on the IEEE Computer Society Board of Governors.[citation needed]
Books
[edit]Gary is an author of many books and over 100 peer-reviewed publications on IT security.
- Software Security: Building Security In, ISBN 978-0-321-35670-3
- Exploiting Software: How to Break Code (with Greg Hoglund), ISBN 978-0-201-78695-8
- Building Secure Software: How to Avoid Security Problems the Right Way (with John Viega), ISBN 978-0-321-77495-8
- Java Security (with Edward Felten), ISBN 978-0-471-17842-2
- Exploiting Online Games: Cheating Massively Distributed Systems (with Greg Hoglund), ISBN 978-0-13-227191-2
- Software Security Engineering: A Guide for Project Managers (with Julia H. Allen, Sean J. Barnum, Robert J. Ellison, and Nancy R. Mead) ISBN 978-0-321-50917-8
- Software Fault Injection (with Jeffrey M. Voas) ISBN 978-0-471-18381-5
- Securing Java: Getting Down to Business with Mobile Code (with Edward Felten), ISBN 978-0-471-31952-8
Notes
[edit]- ^ "The University of Virginia". www.virginia.edu. Retrieved 2015-10-02.
- ^ McGraw, Gary (1995). "Indiana University, Bloomington IN". Indiana University. The Center for Research on Concepts and Cognition. Archived from the original on 10 September 2015. Retrieved 2 October 2015.
- ^ "Software Security Expert Opinion | Gary McGraw". Retrieved December 21, 2017.
- ^ Mills, Elinor (2010-05-12). "Gary McGraw on developing secure software (Q&A)". CNet.
- ^ McGraw, Gary; Migues, Sammy (2010-12-29). "Driving Efficiency and Effectiveness in Software Security". InformIT.
- ^ "Business". www.cigital.com. Retrieved 2015-10-02.
References
[edit]- Ben Rothke. "Software Security: Building Security In", Security Management magazine
- Radu State. Review of "Software Security: Building Security In by Gary McGraw", ACM Queue 4(7):44 (2006)
- "Software Security : Building Security In", Palizine, Issue #18 February 2006
- Robert Bruen. "Software Security. Building Security In", Cipher (IEEE magazine), Jan 5, 2006
- Alen Prodan. "Exploiting Software: How to Break Code", Help Net Security, 21 July 2004
- A. Mariën. Review of "Exploiting Software: How to Break Code by Greg Hoglund and Gary McGraw", ACM Queue, 3(4):60 (2005)
- Robert Bruen. "Exploiting Software. How to Break Code", Cipher (IEEE magazine), January 13, 2004
- Aleksandar Stancin. "Building Secure Software: How to Avoid Security Problems the Right Way", Help Net Security
- Robert Bruen. "Building Secure Software. How to Avoid Security Problems the Right Way", Cipher (IEEE magazine), January 9, 2002
- Diomidis Spinellis. "Book review: Building Secure Software: how to Avoid Security Problems the Right Way", ACM Computing Reviews, 43(4):103–104, April 2002.