3rd deletion
editJoseph Steinberg | |
---|---|
File:Joseph Steinberg.jpg | |
Nationality | American |
Alma mater | New York University |
Employer(s) | Forbes, SecureMySocial |
Known for | Computer Security and Information Security Researcher |
Website | www.JosephSteinberg.com |
Joseph Steinberg is a computer and information security professional known for his innovations in the areas of SSL VPN and anti-phishing technologies,[1][2] as well as for his writing on security-related topics for Forbes.[3] He is an author of security-related books including the International Information Systems Security Certification Consortium's official textbook on information-security management.[4]
Education
editSteinberg is a graduate of New York University's Courant Institute of Mathematical Sciences. He has also earned CISSP, ISSAP, ISSMP,and CSSLP information security designations.[5]
Publications
editArticles
editSince September 2012, Steinberg has authored a column for Forbes entitled Business, Cybersecurity, and Life.[6]
Steinberg has also published security-related articles in publications and journals including the PricewaterhouseCoopers Cryptographic Centre of Excellence Journal,[7] The SANS Institute Reading Room,[8] The View: The Technical Journal for Lotus Notes and Domino,[9] Secure Computing Magazine,[10] The Tech Herald,[11] and VentureBeat.[12]
He has also written articles on tax law,[13][14] entrepreneurship,[15] and lessons learned from historical personalities.[16]
Books
edit- The Official (ISC)2 Guide to the ISSMP CBK - Second Edition Expected Fall 2014
- SSL VPN: Understanding, Evaluating and Planning Secure, Web-Based Remote Access with Tim Speed. ISBN 1-904811-07-8
- Published in French as SSL VPN - Accès Web et Extranets Sécurisés with Tim Speed
- Internet Security: A Jumpstart for Systems Administrators and IT Managers with Tim Speed and Juanita Ellis (Joseph Steinberg listed as contributing author) ISBN 1555582982
Public presentations
editSteinberg has presented his work at conferences including the New York Information Systems Security Association conferences in 2001[17] and 2002,[18] the Gartner IT Security Summit in 2003, the Cyber Security in the Financial Services Sector Executive Summit in 2003,[19] the Wall Street Technology Association Conference on Security, Business Continuity Planning & Technology Risk Management in 2004,[20] the e-Financial World Expo in 2004,[21] the BAI Multi-Factor Authentication Forum in 2006,[22] the Massachusetts Network Communications Council Conference in 2007,[23] and the Next-Generation Threat Protection Summit in 2012[24]
Influence
editSteinberg's technical innovations have been cited in over 70 published U.S. patents and scholarly articles.[1]
Steinberg is quoted in the media about information security related matters, appearing in news wires such as Reuters[25] and Tribune Information Services,[26] major online news outlets such as Fox News,[27] Politico[28] and CBS Interactive/ZDNet,[29] business publications such as Forbes[30][31] and Business News Daily,[32] American newspapers such as The Christian Science Monitor,[33] The Sentinel,[34] and The Sacramento Bee,[35] International newspapers such as The Jerusalem Post,[36] NewsDay,[37] and The International Business Times,[38] magazines such as PC Magazine,[39] PC World,[40] and Inc. Magazine,[41] security-related publications such as Secure Computing,[42] and industry specific news venues such as BankInfoSecurity,[43] the International Bar Association,[44] Risk Management Magazine,[45] and Government Info Security News.[46]
Steinberg has been ranked the most shared Forbes author covering technical topics, and 22nd most shared among all 1024 ranked Forbes authors.[47] His articles have been syndicated[48] and translated.[49] Individual articles by Steinberg have been quoted in over 1,000 online and print venues,[3] shared over 10,000 times on social media,[50][51] and ranked as top performers on Forbes' website.[52]
Steinberg has been credited with educating the public about a modern version of a classic phone fraud scam.[53][54] His criticism of smart gun technology has been cited by the NRA and foreign gun rights groups.[55][49]
Awards
editPersonal life
editSteinberg is a lifelong resident of Teaneck, New Jersey, for which he served as Chairman of its Financial Advisory Board from 2008-2010.[58]
References
edit- ^ a b "Google Scholar page for Joseph Steinberg". Retrieved 2014-05-08.
- ^ "Visual cues may stymie phishers". Network World. 2005-06-27. Retrieved 2014-05-08.
- ^ a b "Example of ~1,000 sites quoting Joseph Steinberg's Forbes article about Heartbleed". Retrieved 2014-05-08.
- ^ http://www.josephsteinberg.com. "List of books by Joseph Steinberg". Josephsteinberg.com. Retrieved 2014-05-10.
{{cite web}}
: External link in
(help)|author=
- ^ "Forbes Official Bio - Joseph Steinberg". Forbes.com. 2014-04-16. Retrieved 2014-05-08.
- ^ "Forbes Column: Business, Cybersecurity, and Life by Joseph Steinberg". Forbes. 2012-09-01. Retrieved 2014-05-11.
- ^ Joseph Steinberg (2002-03-01). "Introducing Air Gap Technology" (PDF). PricewaterhouseCoopers Cryptographic Centre of Excellence. USA: PricewaterhouseCoopers. Retrieved 2014-05-11.
- ^ "SANS Reading Room: SSL VPN Security" (PDF). SANS Institute. 2003-05-16. Retrieved 2014-05-10.
- ^ Joseph Steinberg and Joshua Hosseinof (2002-07-01). "Secure Remote Access to Your Domino Infrastructure" (PDF). The View: The Technical Journal for Lotus Notes and Domino. USA: The View. Retrieved 2014-05-11.
- ^ Joseph Steinberg (2002-05-01). "Secure computing: Untangling Security Issues to Enable Web-based Email Access". Secure Computing Magazine. USA.
- ^ "NCSAM: Battling Against Cyberattacks". The Tech Herald. 2011-10-28. Retrieved 2014-05-09.
- ^ "Why the U.S. is losing the cyberwar against China". VentureBeat. 2011-11-09. Retrieved 2014-05-11.
- ^ Roth IRA
- ^ "Warning About Roth IRA Conversions: Often Misunderstood IRS Rule Can Cost You Money and Aggravation". Forbes. 2014-04-16. Retrieved 2014-05-08.
- ^ "Black Men in America: 5 Entrepreneurship Lessons from Dr. Martin Luther King, Jr". Bmia.wordpress.com. 2014-01-20. Retrieved 2014-05-08.
- ^ "A Final Lesson from Mayor Ed Koch". Forbes. 2014-04-16. Retrieved 2014-05-08.
- ^ "ISSA Computer Security 2001 Program" (PDF). ISSA. 2001-05-16. Retrieved 2014-05-11.
- ^ "ISSA Computer Security 2002 Program" (PDF). ISSA. 2002-05-15. Retrieved 2014-05-11.
- ^ "Cyber Security in the Financial Services Sector Executive Summit". Cyber Security in the Financial Services Sector Executive Summit. 2001-05-16. Retrieved 2003-09-12.[dead link ]
- ^ "WSTA Program" (PDF). WSTA. 2004-10-21. Retrieved 2014-05-11.
- ^ "e-Financial World Expo Program" (PDF). e-Financial World. 2004-11-18. Retrieved 2014-05-11.
- ^ "Joseph Steinberg, CEO of Green Armor Solutions, to Present at the BAI Multi-Factor Authentication Forum". Green Armor Solutions. 2006-06-15. Retrieved 2014-05-11.
- ^ "Massachusetts Network Communications Council Conference: Anything, Anytime, Anywhere: 21st Century Interactions". Joseph Steinberg. 2007-11-01. Retrieved 2014-05-11.
- ^ "Combating Next Generation Threats Requires More than Just Technology". BrightTalk. 2012-09-06. Retrieved 2014-05-11.
- ^ Lipka, Mitch (2011-10-28). "Reuters: Will depositing checks by phone open more doors to bank exits?". Reuters. Retrieved 2014-05-09.
- ^ "Police e-mails were vulnerable to hackers' attack". Fort Worth Star-Telegram - McClatchy-Tribune Information Services via COMTEX. 2011-09-07. Retrieved 2014-05-09.
- ^ Brandon, John (2011-12-03). "Fox News: Could the U.S. Government Start Reading Your Emails?". Fox News. Retrieved 2014-05-09.
- ^ "Security Experts fear ACA Vulnerabilities". Politico. 2013-11-06. Retrieved 2014-05-08.
- ^ Yap, Jamie (2013-02-06). "Security rules for social networks won't resolve breaches". ZDNet. Retrieved 2014-05-09.
- ^ Rapoza, Kenneth (2011-11-08). "On China And Russia Hacking Into US, No Hard Feelings". Forbes. Retrieved 2014-05-09.
- ^ Conner, Cherly (2014-02-24). "Could Your Organization Fall Victim To Phishing? 5 Tips For Reducing The Risk". Forbes. Retrieved 2014-05-09.
- ^ "Cybersecurity Expert Says Small Businesses Beware". Business News Daily. 2011-10-19. Retrieved 2014-05-08.
- ^ Gloria Goodale (2011-09-30). "Christian Science Monitor: Scarlett Johansson cellphone pictures aren't all that smart phone hackers are after". Csmonitor.com. Retrieved 2014-05-08.
- ^ "Tips on how to shop safely online using public Wi-Fi". Florida, USA: The Sun Sentinel. 2011-12-15. Retrieved 2014-05-09.
- ^ Fletcher, Ed (2002-06-06). "Anti-hacking patch wasn't installed". The Sacramento Bee. Sacramento, CA.
{{cite news}}
: External link in
(help); Unknown parameter|deadurl=
|deadurl=
ignored (|url-status=
suggested) (help) - ^ Ben Hartman & Joanna Paraszczuk (2011-10-25). "Justice Ministry cracks case of massive information theft". Israel: The Jerusalem Post. Retrieved 2014-05-09.
- ^ "Will depositing cheques by phone open more doors to bank exits?". Zimbabwe: NewsDay. 2011-10-30. Retrieved 2014-05-09.
- ^ Perna, Gabriel (2011-08-16). "International Business Times: BART vs. Anonymous Shows the Hackers Will be Hard to Control". International Business Times. Retrieved 2014-05-09.
- ^ Poeter, Damon (2011-09-08). "PC Magazine: How Cybersecurity Has Changed Since 9/11. The Experts Weigh In". Pcmag.com. Retrieved 2014-05-08.
- ^ Grant Gross. "HealthCare.gov still has major security problems, experts say". PC World. Retrieved 2014-05-08.
- ^ "Inc. Magazine: Don't Get Hooked". Inc. Magazine. 2005-10-27. Retrieved 2014-05-08.
- ^ "Secure Computing Magazine: RSA finds phishing led to $687m in worldwide loses". Scmagazine.com. 2013-10-31. Retrieved 2014-05-08.
- ^ FFIEC Authentication Guidance (2011-08-10). "BankInfoSecurity: Cracking Down on Phishing - Cross-Border Cooperation Fuels CyberFight". Ffiec.bankinfosecurity.com. Retrieved 2014-05-08.
- ^ Arthur Piper (2013-06-01). "International Bar Association: States of Surveillance". International Bar Association. Retrieved 2014-05-12.
- ^ Arthur Piper (2013-05-02). "Trapping Hackers". Risk Management. USA: RIMS, the risk management society™. Retrieved 2014-05-09.
- ^ Government Info Security News (2012-02-29). "GovInfoSecurity: Can DMARC Hook Online Phishers? Experts Debate Merits of E-Mail Authentication Initiative". govinfosecurity.com. Retrieved 2014-05-11.
- ^ Scanvine (2014-05-13). "Scanvine ranking of Forbes authors". Scanvine. Retrieved 2014-05-13.
- ^ Steinberg, Joseph (2014-02-03). "Yahoo licensed Forbes content". Finance.yahoo.com. Retrieved 2014-05-08.
- ^ a b "ProLegal: Forbes-Artikel zur Sicherheit sog. Smartguns". ProLegal. 2014-05-08. Retrieved 2014-05-08.
- ^ Forbes (2014-05-04). "Recent article shows ~11,000 social media shares". Forbes. Retrieved 2014-05-13.
- ^ "NRA Tweet". Twitter. 2014-05-05. Retrieved 2014-05-08.
- ^ "Example of Forbes top performing article". Twitter.com. Retrieved 2014-05-08.
- ^ "Sidney Police Department Notice". Facebook.com. Retrieved 2014-05-08.
- ^ WFMY 6:17 p.m. EDT March 31, 2014 (2014-03-31). "WFMY - Don't Call Back! Which Area Codes Schemers Are Using". Wfmynews2.com. Retrieved 2014-05-08.
{{cite web}}
: CS1 maint: numeric names: authors list (link) - ^ "NRA Tweet". Twitter. 2014-05-05. Retrieved 2014-05-08.
- ^ http://www.ganton.com/News/40u40.pdf
- ^ "New Jersey CEO Among 'Top Forty Under 40'". Mensa Bulletin. USA: American Mensa. 2007-11-01. Retrieved 2014-05-08.
- ^ Township of Teaneck (2010-02-09). "Township of Teaneck: February 9, 2010 Open Session Minutes". Township Clerk, Teaneck, NJ. Retrieved 2014-05-21.
External links
edit- Joseph Steinberg's personal website
- Forbes Column: Business, Cybersecurity, and Life by Joseph Steinberg
- SecureMySocial official website
- Google Scholar: Joseph Steinberg
2nd deletion
editJoseph Steinberg is CEO of Green Armor Solutions, a vendor of information-systems security technologies.[1] He has also invented several information-security technologies, and has published numerous articles in the field.
Prior to joining Green Armor Solutions, Joseph served in senior-management capacities at several consulting firms and product vendors,[2] after working in technical positions at Citibank and AT&T.[3]
Joseph was recently named one of New Jersey’s top businesspeople under the age of 40 by NJBIZ,[4]a weekly business magazine for New Jersey.
Inventions
editJoseph is the inventor of several information-security technologies and methodologies[5][6], including various anti-phishing technologies as well as mechanisms for strongly authenticating users to online systems without requiring extra efforts from those users. Some of these technologies are incorporated into the Identity Cues[7] series of products offered by Green Armor Solutions, and are (as of July 2007) in use by the members and customers of more than 1,300 credit unions, banks, and other financial institutions.[8][9][10] Due to the non-intrusive nature of the authentication methods Steinberg invented (i.e., they can be configured to be invisible to users), many people authenticated using Steinberg's inventions may not even realize that they are benefiting from augmented security.
Joseph Steinberg also introduced the concept of leveraging psychology in the core design of authentication systems[11], and is a co-author of a white paper[12] that discusses in detail the psychological elements that impact the effectiveness of online authentication solutions.
He also discovered many of the security risks associated with allowing remote access to corporate systems from web browsers[13] and invented innovative ways of addressing these concerns which are now in use by many vendors.[14]
He is also credited with discovering several vulnerabilities in other security products including Microsoft Exchange.[15]
Publications
editIn May 2003, Joseph Steinberg published an article entitled SSL VPN Security[16] (originally published through the SANS Institute [17]); this article was the first to deal specifically with the topic of security issues created by the at-the-time new remote-access technology known as SSL VPN; since its publication, nearly every SSL VPN vendor has acted upon the concerns and recommendations made in Mr. Steinberg's article [18]
He is also the author of one book,[19] and added content to a second.[20] He has also written articles on various topics related to business, information technology, and digital-age security.[21][22]
His most recent book, SSL VPN: Understanding, Evaluating and Planning Secure, Web-Based Remote Access — published in 2005 — has been sold around the world,[23][24][25][26][27][28] and was translated into French in 2006.[29]
Lectures and Presentations
editHe has also lectured on a wide variety of topics; a list of his information-security related lectures can be found here.
External links
editReferences
edit- ^ http://www.greenarmor.com/company.shtml
- ^ http://e-financial.wowgao.com/presentation_proposals/pre_show.php?subjectid=97&
- ^ http://www.packtpub.com/view_author/id/17
- ^ http://www.njbiz.com/events.asp?nID=44&show=details
- ^ http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u=%2Fnetahtml%2FPTO%2Fsearch-bool.html&r=1&f=G&l=50&co1=AND&d=PG01&s1=steinberg.IN.&s2=joseph.IN.&OS=IN/steinberg+AND+IN/joseph&RS=IN/steinberg+AND+IN/joseph
- ^ http://www.northjersey.com/page.php?qstr=eXJpcnk3ZjcxN2Y3dnFlZUVFeXkyJmZnYmVsN2Y3dnFlZUVFeXk2OTExODk5
- ^ http://www.networkworld.com/columnists/2005/062705edit.html
- ^ http://www.net-security.org/secworld.php?id=4362
- ^ http://www.finextra.com/fullpr.asp?id=13264
- ^ http://www.securitypark.co.uk/article.asp?articleid=26214
- ^ http://www.it-director.com/technology/security/content.php?cid=7984
- ^ Downloable from: http://www.greenarmor.com/a-pwp.shtml
- ^ http://www.securitytechnet.com/resource/security/vpn/SSL_VPN.pdf
- ^ ibid.
- ^ http://www.kb.cert.org/vuls/id/111947
- ^ http://www.securitytechnet.com/resource/security/vpn/SSL_VPN.pdf
- ^ http://cnscenter.future.co.kr/security/vpn.html
- ^ As is obvious from the new features announcements made by SSL VPN vendors in the year after the article's publication
- ^ http://www.amazon.com/gp/product/customer-reviews/1904811078/ref=cm_cr_dp_pt?_encoding=UTF8&n=283155&s=books
- ^ Speed, Tim; Ellis, Juanita (2 June 2003). Internet Security: A Jumpstart for Systems Administrators and IT Managers. ISBN 9780080509075.
- ^ http://www.josephsteinberg.com/JosephSteinbergArticles.html
- ^ http://www.zoominfo.com/Search/PersonDetail.aspx?PersonID=84887566
- ^ http://www.comcol.nl/detail/54879.htm
- ^ http://www.amazon.ca/Ssl-vpn-acc%C3%A8s-extranets-s%C3%A9curis%C3%A9s/dp/221211933X/ref=sr_1_1/701-8193347-9236322?ie=UTF8&s=books&qid=1187731261&sr=1-1
- ^ http://www.amazon.co.uk/SSL-VPN-Understanding-Evaluating-Web-Based/dp/1904811078
- ^ https://tlsj.tenlong.com.tw/WebModule/BookSearch/bookSearchViewAction.do?isbn=1904811078&sid=34700
- ^ http://www.hcw.be/p.aspx?p=F9252
- ^ http://www.lavoisier.fr/notice/fr332211.html
- ^ http://www.eyrolles.com/Informatique/Livre/9782212119336/livre-ssl-vpn.php
1st deletion
editJoseph Steinberg is an author who specializes in information-systems and data security. He is the author of the book, SSL VPN: Understanding, Evaluating and Planning Secure Web-Based Remote Access, a contributing author of the book, Internet Security: A Jumpstart for Systems Administrators and IT Managers, and the writer of numerous articles on topics related to information-systems security and business.