Robert Siciliano

Business builder, strategic marketer, security analyst, published author, television news correspondent, actor. Deliver presentations throughout the United States and Canada on identity theft protection and personal security.

Work with Fortune 1000, IT and startups. Launching, branding, messaging, representation, m&a facilitator, SEO and media.

Current private equity projects include dynamic biometrics, credit card platform multi-factor authentication, security investigations and telemarketing fraud mitigation.

Recognize Your Willingness to give up your Privacy

If a stranger stopped you on the street and requested your e-mail address and birthdate, would you give it to that person? A rational person would never give up this information....more

Man beheaded in break-in, missing Wife’s Body found

In Putnam County, Georgia, a crazed killer may be on the loose (if he’s not already in another state by now). He (and maybe he had an accomplice) beheaded Russell Dermond, 88. Nobody knows why. At the time his decapitated body was found, his wife, Shirley, 87, was missing. But two weeks later her body was found near a dam, dead from blunt force trauma.Dermond’s head has not been located....more

What is an Advanced Persistent Threat?

If you’ve ever seen a movie where the bad guys are using ongoing, invasive hacking to spy on their “enemy,” you have some familiarity with an advanced persistent threat (APT)....more

What is Wardriving?

Wireless networks have certainly brought a lot of convenience to our lives, allowing us to work and surf from almost anywhere—home, cafes, airports and hotels around the globe. But unfortunately, wireless connectivity has also brought convenience to hackers because it gives them the opportunity to capture all data we type into our connected computers and devices through the air, and even take control of them....more

Graduates beware of Identity Theft

Worried about finding a job after you graduate from college? Worried about paying off your debts? It gets uglier: New college grads need to think about their identities being stolen. One-third of identity theft complaints come from young adults....more

How to protect your Home from Zombies

There’s all sorts of threats out there—including zombies—just waiting to get you. Today’s zombies look like the ones on TV and in the movies but the ones who walk amongst us are often addicted to hardcore drugs like meth amphetamines and other mind/body destroying chemicals.  But you can fight the walking dead  off with preparedness.Portals...more

How to Prepare a Storage Device for Resale

If you want to sell a storage device, first back everything up on it with a flash drive, external drive or automated backup service. For Android or iOS, activate the Google Auto Backup service or Apple’s iCloud.Next, wipe the device. No, not with a rag, but wipe out the data, completely. Reformatting the hard drive can still leave data. Hitting “delete” won’t work, either....more

How to choose a Video Surveillance System

Selecting a video surveillance system will depend, in part, on the nature of your home: size, layout, number of possible entry points, etc. Before purchasing a video surveillance system, figure out exactly why you need this technology and where you’d like to have the cameras mounted....more

Bankers on the Front lines of Cyber Defense

There was once a time when the only threat to a bank’s security was when that innocent-looking man hands a note to the bank teller that makes her face go ashen. And the only security, save for video surveillance, was the armed guards and the silent alarm that the teller triggers....more

Healthcare Firm pays Big Bucks for Breach

A data breach can slug below the belt and knock a healthcare business flat on its back, as was the case with Columbia University and the New York and Presbyterian Hospital....more