Connect with us

Joseph Steinberg (Original Home Page Until July 8 2020)

Receive a FREE checklist: 10 Important and Easy Steps to Secure Your Smartphone and Laptop when you sign up for my weekly newsletter.

Overwhelmed by complex, impractical, or difficult-to-follow cybersecurity advice?
I make cybersecurity simple – and will help you stay safer than before – while making staying cyber-safe a lot easier for you than you thought possible.
Please sign up for my weekly newsletter – I will send you information that you want, and will never SPAM you.
* indicates required

Speaker

Topics include: cybersecurity, digital crime, privacy, and technology trends.
Expert, highly convincing and entertaining presenter.
Available for keynotes, conferences, and corporate events.
Available for television appearances.

Influencer

Leverage position as top-ranked influencer and trusted authority in cybersecurity and tech to help firms grow their brand recognition and sales pipelines.
Author thought leadership articles to improve client’s credibility and website traffic.
Provide high level cybersecurity guidance based on decades of experience.
Assist investors and others with due diligence on cybersecurity and tech related firms.

Advisor

Advise regarding strategic activities based on decades of experience.
Serve on official advisory boards to improve visibility and credibility.

Expert Witness

Highly convincing expert for both technical and non-technical audiences.
Respected worldwide for domain expertise and decades of experience.
Can also help attorneys prepare for trial or determine a case’s merits.
You May Receive Seeds From China In The Mail – If You Do, Contact The Government And Do Not Plant The Seeds

You May Receive Seeds From China In The Mail – If You Do, Contact The Government And Do Not Plant The Seeds

Over the past few days, Americans across the country have reported receiving unsolicited packages of seeds sent to them in the US Mail, in envelopes that appear to have originated in China. Some of the packages are labeled with false content labels – sometimes indicating that the contents are jewelry. The United States Department of ...
Many Security Cameras Tell Criminals When You Are Not Home – Even If Would-Be Robbers Cannot Access Your Videos

Many Security Cameras Tell Criminals When You Are Not Home – Even If Would-Be Robbers Cannot Access Your Videos

Internet-connected cameras placed inside your home might allow would-be burglars to easily determine when nobody is home, even if the evildoers can neither access your video feeds nor see the cameras. Most Internet of Things (IoT) cameras record and transmit information – usually video feeds or files themselves – to cloud-based storage locations, and do ...
I Am A CyberSecurity Professional For 25 Years. Here Is How I Use Tik Tok Securely.

I Am A CyberSecurity Professional For 25 Years. Here Is How I Use Tik Tok Securely.

Tik Tok. Some pundits describe the social media platform as an amazing outlet for young people to share their videos, while others consider it nothing less than a threat to American national security. Millions of people upload content to the video network every day – yet, India has banned the platform, various businesses including Wells ...
To Top