Connect with us

Joseph Steinberg (Original Home Page Until July 8 2020)

Receive a FREE checklist: 10 Important and Easy Steps to Secure Your Smartphone and Laptop when you sign up for my weekly newsletter.

Overwhelmed by complex, impractical, or difficult-to-follow cybersecurity advice?
I make cybersecurity simple – and will help you stay safer than before – while making staying cyber-safe a lot easier for you than you thought possible.
Please sign up for my weekly newsletter – I will send you information that you want, and will never SPAM you.
* indicates required

Speaker

Topics include: cybersecurity, digital crime, privacy, and technology trends.
Expert, highly convincing and entertaining presenter.
Available for keynotes, conferences, and corporate events.
Available for television appearances.

Influencer

Leverage position as top-ranked influencer and trusted authority in cybersecurity and tech to help firms grow their brand recognition and sales pipelines.
Author thought leadership articles to improve client’s credibility and website traffic.
Provide high level cybersecurity guidance based on decades of experience.
Assist investors and others with due diligence on cybersecurity and tech related firms.

Advisor

Advise regarding strategic activities based on decades of experience.
Serve on official advisory boards to improve visibility and credibility.

Expert Witness

Highly convincing expert for both technical and non-technical audiences.
Respected worldwide for domain expertise and decades of experience.
Can also help attorneys prepare for trial or determine a case’s merits.
Small Business Are Suffering Breaches – And Going Bust – Because They Don’t Have Access to Cyber-Threat Intelligence

Small Business Are Suffering Breaches – And Going Bust – Because They Don’t Have Access to Cyber-Threat Intelligence

In the context of cybersecurity, threat intelligence refers to information about hostile actors and/or the threats that they pose; cyber-defenders who arm themselves with such information can often dramatically improve their chances of preventing a breach. Of course, the concept of knowing your enemy is not knew – Sun Tzu speaks about its importance in ...
Images Of Government-Issued IDs Should Not Be Trusted For Authentication

Images Of Government-Issued IDs Should Not Be Trusted For Authentication

Government Issued identity documents (IDs), such as passports and drivers’ licenses, may be appropriate forms of authentication when presented in person, but we must stop trusting images of any such documents when they are utilized online. In fact, images of government issued IDs are commonly available on the dark web for purchase, trade, or even ...
Banning President Trump From Social Media May Seem Moral, But It Is Both Wrong And Threatens Our Democracy

Banning President Trump From Social Media May Seem Moral, But It Is Both Wrong And Threatens Our Democracy

Back in 2019, I wrote that lawmakers must prohibit social media platforms from banning anyone for making posts that are legal to publish, and that failing to enact such legislation would open a dangerous Pandora’s Box. I explained then that there was more than enough legal standing on which to base such laws – and ...
To Top