July 29th, 2016 Brainlink Chief Technology Officer Raj Goel explains how you can protect yourself, and your information. http://video.cnbc.com/gallery/?video=3000538863
Hacking For Ransom
Category: Media Security
How Private are Your Online Communications?
Raj joined Todd “Bubba” Horwitz on LibertyTalk.fm to talk about Cyber Security on April 8,2016. Raj is a world renowned expert in the field and deals with major hedge funds and financial groups. Raj talks about the industry and many of the flaws and loopholes in the laws of the internet. Raj is very upset at the way the […]
What You Need to Know About the Advanced Malware Apocalypse
GHA Technologies and WatchGuard Presents: Hackers are getting more and more devious and sophisticated. As threats are closed off, they are finding new ways to attack. This seminar tells you what you need to know to be proactively prepared to protect corporate assets. We’ll be covering security trends threatening in 2015 and how you can […]
The Dating Game: Dating Sites, Penetration Testing, Corporate Espionage and Psychopaths. A love story.
The Dating Game: Dating Sites, Penetration Testing, Corporate Espionage and Psychopaths. A love story. January 2015 Raj Goel, CISSP CTO Brainlink International, Inc. firstname.lastname@example.org 917-685-7731 Raj’s LinkedIn profile This article appeared in InfoSecurity Magazine January/February Issue Only two things in life are certain: death. And dating sites. Whether it’s match.com, eHarmony.com, okcupid.com, jdate.com for Jewish […]
GBATA Keynote – A Global Overview of Trends in Private, Corporate and Government Surveillance
GBATA 2013 Keynote
July 3rd, 2013 Click here to read Raj Goels’ “A Global overview of Trends in Private Corporate and Government Surveillance Testimonials Laurent Groff Dr. Thomas P. Keenan
Are You Googling Your Clients’ Privacy Away?
Date: Jul 12,2013 Event: https://www.brighttalk.com/webcast/188/73699 This presentation addresses how various services offered by Google can become a threat to your companies’ privacy and confidentiality policies. It deals with Google’s capabilities to capture and aggregate information with or without user knowledge. Special attention is given to Google’s key offerings such as: * Google Searches * GMail […]