Jeremy started writing code for MUDs (Multi User Dungeons) on a 66 Mhz 486 running Slackware Linux in 1995, he has never been the same since. Jeremy is responsible for conducting risk assessments, threat modeling, code reviews, application security assessments, research, and reverse engineering. He has discovered numerous critical flaws and bugs. He helps organizations by understanding their key risks and building security into their organization (through people, processes, and the technology stack).
At 7 years old, Mike was hammering on the keys of a Ti-99 computer. By age 10, Mike was a licensed amateur radio operator and was building Intel x86 computers in his room at home. Now, a two-time Blackhat speaker with media mentions in publications such as Forbes. Mike leads Carve Systems to help clients manage technology risk, and operate with appropriate levels of security assurance.
Max began hacking on computers in The Valley and barely escaped the wreckage of the dot com bubble with his sanity intact. He trekked eastward and worked in quantitative finance before finding out that breaking computers is a legitimate profession. He has responsibly disclosed bugs in mobile payment, public transit, embedded internet devices, and Android smartphones and spoken at high-profile industry conferences such as CanSecWest and ShmooCon. Max manages Carve's consulting practice and works with customers to understand and manage technology risk.