Receive a FREE checklist: 10 Important and Easy Steps to Secure Your Smartphone and Laptop when you sign up for my weekly newsletter.
Overwhelmed by complex, impractical, or difficult-to-follow cybersecurity advice?
I make cybersecurity simple – and will help you stay safer than before – while making staying cyber-safe a lot easier for you than you thought possible.
Please sign up for my weekly newsletter – I will send you information that you want, and will never SPAM you.
Topics include: cybersecurity, digital crime, privacy, and technology trends.
Expert, highly convincing and entertaining presenter.
Available for keynotes, conferences, and corporate events.
Available for television appearances.
Leverage position as top-ranked influencer and trusted authority in cybersecurity and tech to help firms grow their brand recognition and sales pipelines.
Author thought leadership articles to improve client’s credibility and website traffic.
Provide high level cybersecurity guidance based on decades of experience.
Assist investors and others with due diligence on cybersecurity and tech related firms.
Highly convincing expert for both technical and non-technical audiences.
Respected worldwide for domain expertise and decades of experience.
Can also help attorneys prepare for trial or determine a case’s merits.
Here is a heads up about a crafty scam currently targeting businesses of all sizes. As companies hire interns for the upcoming summer school break, criminals are submitting bogus applications for internships – including some that offer to work in exchange for real-world-training and no pay – through the application and contact features of business […]
Over the past few weeks, it has become clear that hidden microphones – once the stuff of spy novels and creepy voyeurs – are rapidly proliferating, and have become a serious problem in today’s connected society. Last week, the world learned that the in-flight entertainment systems built in to seatbacks on many airplanes belonging to […]
Application security refers to the realm within the information security discipline that addresses improving the security of software. It encompasses tasks such as finding, correcting, and preventing both the creation of, and the exploitation of, security vulnerabilities that might otherwise allow hostile actors to perform unauthorized actions to information assets. Many non-technical users have a […]