Get in Touch
In my forthcoming book, Swiped, partially excerpted below, I examine some of the enterprise level, cybersecurity best practices. These are the questions organizations need...
Given all of the big-name data breaches that have occurred during the past few years, there’s a good chance your personal or payment information...
Every year at about this time, technology reporters typically recount the big computer crimes from the past 12 months and proclaim “The Year of the Hacker”...
Your Uber account is about 17 times more valuable to a hacker than your credit card credentials, according to a report security company Trend...
In the 2016 presidential race, Cybersecurity has clearly taken a backseat to issues like terrorism, healthcare, and campaign finance. In a 12-month period that...
There is no shortage of punditry about former Secretary of State Hillary Clinton’s homebrew server, and the resulting fallout, aka “Emailgate.” Whether you read...
Steve Jobs understood what people want. His insistence on making hard things easier — for instance, using a personal computer — was an essential...
No matter how good or lucky the investor, no one beats the market 100% of the time—unless, of course, you are Bobby Axelrod. There...
The only sure thing in the world of information security is that there is no such thing as a failsafe solution. It’s crucial not...
When Republican presidential nominee Donald J. Trump said he hoped the Russian government had found Hillary Clinton’s 30,000 missing emails, he wasn’t just taking...