Connect with us

In the Media

In the Media

Joseph Steinberg frequently appears in the media to discuss matters related to cybersecurity, technology, and business. In addition to television and radio appearances, he writes a column entitled Business, Cybersecurity, and Life that has been carried by Forbes and Inc. Joseph and his articles are quoted by others on a frequent basis, with some of his articles being quoted in thousands of different venues. Here are some sample print/web appearances:

 

Asbury Park Press: Area code scam: Don’t get suckered (March 14, 2017)

Parade: Avoid This Phone Scam: Don’t Answer Calls From This Area Code (March 14, 2017)

The Clarion Ledger: Phone scammers using new tactics (March 10, 2017)

Brit & Co: This Is the Scary Reason Why You Shouldn’t Answer Calls from Strange Area Codes (March 10, 2017)

Good Housekeeping: To Avoid Scammers, Don’t Answer Calls From These Area Codes (March 8, 2017)

Hearst (National): BEWARE: Chase Bank phishing scam targeting customers (March 8, 2017)Joseph Steinberg

Hearst (National): Phishing scams offering prizes on the rise: 5 ways to protect yourself (February 24, 2017)

GigaOm: Four Questions For: Joseph Steinberg (January 23, 2017)

WFMY News: Why You Shouldn’t Use Your Fingerprint To Get Into Your Phone (January 19, 2017)

Smart Data Collective: 3 Lessons for enterprise Businesses After Yahoo’s Admission of a Massive Data Breach (January 11, 2017)Joseph Steinberg

CSO: CISOs shouldn’t wait until retirement for social security (September 22, 2016)

CNBC: A big threat facing the presidential election no one is talking about (September 2, 2016)

Nightly Business Report: Costs of state security hacks (September 1, 2016)

 

Inc: How This Startup Built a Wearable for Worst-Case Scenarios (August 22, 2016)Joseph Steinberg

Business Insider: How Simplilearn Became One Of The Most Effective Education Startups In Recent Times (August 12, 2016)

Inc 42: Movers and Shakers of the Week (August 6, 2016)

CSO Today: Joseph Steinberg Joins Simplilearn Advisory Board (August 3, 2016)

The Economic Times (India):Simplilearn Redefines Training for Indian IT Industry (July 28, 2016)

Buzzfeed: How To Find Out If Your Twitter Account Is Vulnerable To Hackers (June 30, 2016)Joseph Steinberg

Social Media Today: musical.ly is Dominating the Social World of Teens (June 21, 2016)

Entrepreneur: How Social Media Jeopardizes Data Security (May 19, 2016)

PC & Tech Authority: President Obama says smart guns might have a role to play in reducing shootings (May 5, 2016)

Business To Community: 5 Things to Avoid When Putting Your Company on Social Media (May 2, 2016)

Yahoo: Police examining Texas fitness trainer Missy Bevers’ prolific social media presence in her unsolved slaying (April 21, 2016)

Forbes: 5 Tips For Keeping Your Business Safe On Social Media With Joseph Steinberg (February 24, 2016)
Joseph Steinberg

I-Sight: Top 20 Tips for Preventing Data Theft (February 20, 2016)

Geek Time: Don’t let a tweet end your career (February 1, 2016)

Tabi Labo: Learn Seven Lessons From Martin Luther King (In Japanese) (February 1, 2016)

The Examiner: The ‘Internet of Things’ or IoT more common and hackable (January 7, 2016)

Business.com: The Security Risks in Social Media: Interview with Joseph Steinberg (January 5, 2016)Joseph Steinberg

SC Magazine: Advantech described as ‘Lazy ‘in fixing vulnerability (December 7, 2015)

La Stampa: L’impronta digitale è più o meno sicura della password? (November 28, 2015)

Dow Jones MarketWach: Here’s a good reason to pay for your holiday gifts in cash (November 27, 2015)

Entrepreneur: The Top Social Media Tools for Working Smarter, Not Harder (November 5, 2015)
Also published by Fox News (November 5, 2015)

Joseph Steinberg

The Cheat Sheet: 4 Top CEOs Reveal Their Secrets to Career Success (October 18, 2015)

Inverse: The 5.6 Million-Fingerprint Breach Could Haunt Its Victims Forever: SecureMySocial CEO Joseph Steinberg On What Losing Fingerprint Identities Actually Means. (September 28, 2015)

WFMY-CBS: Fake LinkedIn Profiles & Why Social Media Won’t Stop Them (September 25, 2015)

CFO: Chinese Malware Hack Hits ‘Jailbroken’ iPhones (September 1, 2015)

Computerworld: Apple iPhone jailbreak? STOP! KeyRaider is your worst iOS nightmare made real (September 1, 2015)

USA Today: Cyber-shark sightings hit the digital world this summer (July 19, 2015) Also published by the Detroit Free Press, Albany Times Union, Post Bulletin, Government Technology, and others.

CNBC: The new ‘virtual’ kidnapping craze (July 9, 2015)Joseph Steinberg

Money Magazine: What to Do When You Find a Lost Credit Card (July 2, 2015)

Entrepreneur: 4 Essentials to Secure Your Business Even From State-Sponsored Online Threats (June 3, 2015)
Also published by Fox News (June 3, 2015)

CIO: How your employees put your organization at risk (May 28, 2015)

ComputerWorld: ‘Venom’ vuln poisons your cloud (so patch now) (May 14, 2015)

Software Advice: Are Millennials the Latest Security Threat? (May 11, 2015)Joseph Steinberg

The Week: Game of Thrones: is leak bad news for networks and fans? (April 13, 2015)

 

Secure Link: Landmark privacy and cybersecurity cases felt around the world (March 18, 2015)

Digital Guardian: Data Security Experts Answer: What is the Biggest Misconception Companies Have About Endpoint Security & Protection Tools? (March 11, 2015)

Society for Human Resource Management: Lessons Learned from Anthem Data Breach (February 10, 2015)

Entrepreneur: Meet Memo, the Anonymous App That Could Revolutionize the Workplace (January 16, 2015)

CNBC: How people buy and sell illegal stuff online (January 8, 2015)

WFMY News: Is 2015 The Year Your Home Gets Hacked? (January 5, 2015)

Top Secret Writers: US Deploys a Laser-Laden Drone Hunter in the Persian Gulf (December 24, 2014)

Software Advice: A Rating of 2014’s Top Cybersecurity Issues (December 18, 2014)

MainStreet.com: Hotel Site Booking.com Targeted by Scammers: How to Protect Yourself (November 12, 2014)

Akihabara News: The Right To Be Forgotten in Japan (October 13, 2014)

Kansas City Star: Textbook’s sexist photos dismay advocate for women in science and related careers (October 7, 2014)

Financial Chronicle: Is India ready for an IT revolution? (October 7, 2014)

Deseret News: European court order pits free speech against privacy on the Internet (October 5, 2014)

Forbes: JP Morgan Chase Warns Customers About Massive Data Breach (October 2, 2014)

Risk Managament: Hacking the Hackers (October 1, 2014)

Forbes: America’s ‘Right to Be Forgotten’ Fight Heats Up (September 30, 2014)

Epoch Times Deutschland: The Fappening Nacktfoto-Hack: Ist es Strafbar die gehackten Promi-Bilder zu verbreiten? (September 30, 2014)

The Epoch Times: Can Sharing Hacked Celebrity Photos Get You Arrested or Sued? (September 29, 2014)

The Epoch Times: The Fappening 3: Cara Delevingne Nude Photos? Lauren O’Neil, Briana Evigan Purported Naked Pictures Uploaded As well (September 27, 2014)

U.S. Attitudes Toward the ‘Right to Be Forgotten’ IndustryView (September 5, 2014)

Newsphere Japan: {Article in Japanese} (September 4, 2014)

The Oracle: Leaked photos raise questions about iCloud security (September 4, 2014)

USA Today: Leaked nude pictures a violation of privacy (September 3, 2014)

BBC: Apple confirma cómo fueron pirateadas las cuentas de Jennifer Lawrence y otros famosos (September 2, 2014)

BBC: ¿Cómo robaron las fotos de Jennifer Lawrence? (September 2, 2014)

La Nacion: Hackers desnudan a las famosas en la web (September 2, 2014)

Puebla: Así robaron las fotos hot de Jennifer Lawrence y otras famosas (September 2, 2014)

Teletica: Las fotos privadas de las estrellas y el misterio de la filtración (September 2, 2014)

Latinos Post:Jennifer Lawrence’s Nude Photos Leaked; Rep Confirms it’s ‘Real’ (September 2, 2014)

WBAL: What We Can Learn From Celebrities’ Nude Photos Leak (September 2, 2014)

Tech2: 1.2 billion passwords stolen: Why the world isn’t entirely convinced (August 8, 2014)

Manila Standard: When everything is digital (July 21, 2014)

CBR: 5 reasons Heartbleed has been good for cyber security (July 21, 2014)

Information Age: 3 months on: The true impact of Heartbleed on the enterprise (July 2, 2014)

Triple Pundit: Heartbleed Continues to Threaten Internet Security and Consumer Trust (July 2, 2014)

Consumer Affairs: Don’t fall for utility bill scams (June 12, 2014)

The Spectator: Internet lives on after heartbleed (April 24, 2014)

Inman News: Are you ready for the next Heartbleed bug? (April 22, 2014)

ValueWalk: Mutual Fund Company Asks Clients To Change Passwords Amidst Virus (April 16, 2014)

Orlando Sentinal: Heartbleed bug: What passwords you need to change (April 14, 2014)

Tech Times: Heartbleed bug threats are serious; change passwords? Here’s why (April 11, 2014)

WFMY News: Don’t Call Back! Which Area Codes Schemers Are Using (March 31, 2014)

Main Street: Self-Defense in an Age of Credit Card Breaches (March 18, 2014)

WFMY News: How Your Fridge Can Be Used By Computer Hackers (February 7, 2014)

Payscale: Three Ways to Honor Martin Luther King, Jr. at Work (January 20, 2014)

Mainstreet.com: Murder By Internet (December 19, 2013)

CreditCards.com: What To Do When You Find A Lost Credit Card (December 3, 2013)

Politico: Security experts fear ACA vulnerabilities (November 5, 2013)

Risk Management: Trapping Hackers (May 2, 2013)

Credit Union Times: Threat of the Week: China’s Professional Hackers (March 11, 2013)

ZDNet: Security regulation for social networks won’t resolve breaches (February 6, 2013)

 

ZDNet: Enterprises using new tech to deceive hackers (January 28, 2013)

ZDNet: Specialization in non-security fields key to fighting cyberthreats (December 21, 2012)

ZDNet: Tech-savvy psychologists a boon for security
(November 5, 2012)

ZDNet: Cyberespionage Skills Go Beyond Technical Ability
(September 27, 2012)

Bank Info Security: Why Banks Can Expect More Attacks (September 24, 2012)

ZD Net: Authentication Questions Alone No Longer Safe (August 30, 2012)

SC Magazine: RSA finds phishing led to $687m in worldwide loses (August 23, 2012)

Your Security Resource: Find My Laptop – Your Guide to Device Location Services (August 23, 2012)

ZDNet: Social Engineering Threat Affects All (August 14, 2012)

ZDNet: Organizations Should Beware Search Engine Data
(August 10, 2012)

Phishing Attacks at All Time High: Psychological Approach Delivering Security as Technical Defenses Continue to Fail (July 25, 2012)

SC Magazine: A New Way to Net Phish (April 2, 2012)

BankInfoSecurity: Can DMARC Hook Online Phishers? Experts Debate Merits of E-Mail Authentication Initiative (February 29, 2012)

Also covered by GovInfoSecurity

(Note: My comments on DMARC are available here.)

ZDNet: Open source model creates new cybercrime frontier (February 23, 2012)

Green Armor CEO Discusses Weaknesses of New DMARC Anti-Phishing Initiative (February 15, 2012)

Also covered by Virtual Strategy magazine

ZDNet: Creative recruitment more effective for hiring security talent (January 4, 2012)

The Sun Setinel: Tips on how to shop safely online using public Wi-Fi (December 15, 2011)

TMC-Net: Green Armor’s SiteAuth Technology Now Available (December 13, 2011)

The Examiner: A Closer Look at Facebook Hackers (December 8, 2011)

Wired: Hackers Skim Lucky Supermarket Customers’ Credit Cards via Self-Checkout (December 7, 2011)

Arts Technica: Hackers Hit Supermarket Self-Checkout Lanes, Steal Money From Shoppers (December 7, 2011)

The Tech Herald: 2012 Predictions: Looking Ahead at the Threat Landscape (December 5, 2011)

Fox News: Could the U.S. Government Start Reading Your Emails? (December 3, 2011)

eCommerce Times: Feds Hound E-Commerce Counterfeiters on Cyber Monday (November 29, 2011)

Security News Daily: Porn and Gore Flood Facebook (November 15, 2011)

ZDNet: Online Anonymity Hard to Achieve But Not Impossible (November 9, 2011)

Also published in ZDNet-Australia (November 10, 2011)

Forbes: On China And Russia Hacking Into US, “No Hard Feelings” (November 8, 2011)

Reuters: Will depositing checks by phone open more doors to bank exits? (October 28, 2011)

Also published by The Huffington Post: Check Deposit Could Threaten Reign of Big Banks

 Also published by Newsday: Will depositing cheques by phone open more doors to bank exits?

The Jerusalem Post: Justice Ministry Cracks Case of Massive Information Theft (October 25, 2011)

Security News Daily: Small Businesses Need to Beware of Online Criminals (October 20, 2011)

Also published in Business News Daily

iVillage: How To Protect Your Cell Phone from Hackers (October 18, 2011)

Special Operations Technology: Cybersecurity (Volume 9 Issue 8 – October 2011 Issue)

Rebel Gaming: Sony Blames the Lastest Data Breach On YOU! (October 13, 2011)

Information Week: Sony Locks Accounts After Data Breach (October 12, 2011)

Security News Daily: 5 Security Tips to Mark National Cybersecurity Awareness Month (October 7, 2011)

Christian Science Monitor: Scarlett Johansson Cellphone Pictures Aren’t All That Smart Phone Hackers Are After (September 30, 2011)

Also covered in the Alaska Dispatch

And covered by CBS affiliates, Fox affiliates, NBC affiliates, and others on October 3, 2011

Linux Insider: That Was the Breach That Was (September 27, 2011)
Also covered by TechNewsWorld, Futeroa, Linux Planet

eCommerce Times: OnStar’s Plan to Keep Tabs on Ex-Customers Riles Lawmakers (September 26, 2011)

Also covered by the Nebraska News

ZD Net: Google Wallet holds promise but challenges ahead (September 26, 2011)

Albany Times Union: School Sports Ads Not Official (September 25, 2011)

eWeek: Mitsubishi Heavy Network Most Likely Compromised by Spear-Phishing Attack (September 21, 2011)

ZD Net: Improving security by removing admin rights not practical (September 20, 2011)

Nonprofit Coversation: The Hackers Are Coming: What Steps to Take NOW To Ensure Cybersecurity of Your Non-Profit (September 14, 2011)

PC Magazine: How Cybersecurity Has Changed Since 9/11 (September 8, 2011)
Also covered on various other sites

Fort Worth Star-Telegram: Police e-mails were vulnerable to hackers’ attack (September 7, 2011)

Bob’s Guide: Green Armor Offers Cybersecurity Assistance to Dutch Government After Breach(September 6, 2011)

The Statesman: Hackers Target Elgin-Based Police Chiefs Association (September 2, 2011)

The Christian Science Monitor: Who released the trove of unredacted WikiLeaks documents? (September 1, 2011) Part 1 and Part 2

Also covered in The Alaska Dispatch and The Minneapolis Post

Orange County Philanthropy Examiner: Nonprofit Cyber Security – How to Lock Your Electronic Door(August 26. 2011)

International Business Times: BART vs. Anonymous Shows the Hackers Will be Hard to Control (August 16, 2011)

Freedom Fighters or Vandals? No Consensus on Anonymous (August 16. 2011)

Appeared in the Contra Costa Times, the Silicon Valley Mercury News , and TMC Net.

Bank Info Security: Fighting Cybercrime (August 12, 2011)

Rutgers University: Information Protection and Security (August 11, 2011)

Bank Info Security: Cracking Down on Phishing (August 10, 2011)

For older cybersecurity-related articles mentioning/quoting Joseph Steinberg please click HERE.

For cybersecurity-related articles written by Joseph Steinberg please click HERE.

 

JOIN MY NEWSLETTER!

* indicates required
To Top