Here are a few online articles and appearances.
- May 3, 2023 – Best Tools for Online Privacy & Security, WebSiteRating.com
- Nov. 25, 2022 – 9 holiday gift ideas for open source enthusiasts in 2022, Opensource.com
- Sept. 15, 2022 – Interview with Author & Cybersecurity Specialist Greg Scott, Eleanor Bennett, Logit.io
- June 10, 2022 – Do Your Homework, Hollywood! Damien Black, Cybernews
- April 4, 2022 – Fake kidnap scams, Damien Black, Cybernews
- Jan. 20, 2022 – (More Than) Five Tips to Repel Ransomware Attacks
- Aug. 17, 2021 – Why We Should Cringe at Hollywood Hackers, Jurgita Lapienytė, Cybernews
- June 3, 2021 – The 7 Best Mini-PCs of 2021, Adam S. Doud, Lifewire
- April 30, 2021 – How a university got itself banned from the Linux Kernel, Minica Chin, The Verge
- March 2, 2021 – Data Leaks: Is Your Company’s Data Already For Sale Online? Rob Baillieul, LifeRaft
- Feb. 24, 2021 – Five Things Each Of Us Can Do To Help Unite Our Polarized Society
- Jan. 15, 2021 – What Is Cyber Security All About? 13 Experts Weigh In, Casey Crane, Infosec Insights
- Jan. 3, 2021 – How do you fight cybercriminals? Think like one, Vilius Petkauskas, Cybernews.com
- Nov. 12, 2020 – The Role of Access Control in Information Security, Casey Crane, The SSL Store
- Nov. 6, 2020 – A Beginner’s Guide to IoT Security, Patricia Staino, The Motley Fool
- Oct. 13, 2020 – What is a Firewall? Casey Crane, The SSL Store
- Oct. 8, 2020 – What is Cybersecurity? FRSecure
- Oct. 3, 2020 – Can an Identity Thief Change Your Home Address?
- Oct. 2, 2020 – What is Smishing? Definitions, Examples, and Protection Tips. Casey Crane, The SSL Store
- Sept. 30, 2020 – The Future of Smart Homes, Authority Magazine
- Sept. 21, 2020, “Can an Identity Thief Change Your Home Address?” Chron
- Aug. 20, 2020 – 3 Must-Haves to Protect Remote Workers from Cyberattacks
- Aug. 20, 2020, How do you answer, “Tell me about a time you failed.”
- Aug. 13, 2020 Test Guild by By Joe Colantonio – Cyber Security Tips and Virus Bombs with Greg Scott
- July 3, 2020, Round Table with Sharifah Hardie
- July 2, 2020, Face to face with Sharifah Hardie
- June 17 2020, Infosec Insights – SMBs: 10 Cyber Security Tips That Make You a Tougher Target in 2020
- June 10, 2020, Credit Donkey – Are Online Banks Safe?
- June 5, 2020 Round Table with Sharifah Hardie
- April 23, 2020 Expert tips on how to effectively work from home during COVID-19 pandemic
- March 26, 2020, Irish Tech News – “Virus Bomb” Reviewed
- March 9, 2020, Irish Tech News – Greg Scott Author Interview
- Feb. 7, 2020, Publisher’s Weekly – How to Avoid Writing Tech Gibberish
- Nov. 30. 2019. Government Technology Magazine – Book Review: Virus Bomb
- Nov. 11, 2019. 3 Cyber Crime Clichés That Will Kill Your Writing DEAD
- Nov. 2019 Cyber Defense Magazine, Page 81: “So, Ya Wanna Be a Pen Tester, Huh?”
- Sept. 9, 2019, Updated June 17, 2020 – 52 Key Cybersecurity Tips. Adopt Open is suggestion number 51. More on why adopting open is important right here.
- July 11, 2019, Morgan James Publishing Red carpet Event
- 8 Tips to Spot an Online Impostor
- MoneyTips Identity Protection Survey Findings
- Feb. 25, 2019, An Identity Theft Victim Speaks – Midland Daily News
- CES 2018, Former Governor Tim Pawlenty on digital privacy.
- Oct. 25, 2017, Rod Rosenstein’s responsible encryption fantasy quoted in Bigger Law Firm
- April 18, 2016. Bullseye Breach was a 2015 Midwest Book Awards finalist
- Aug. 4, 2015. Bullseye Breach excerpt, CSO Online
- June, 2015. The Software Defined Perimeter, Defined by Open Source. CIO Review
Recent Comments