BlogHide Resteemsmrosenquist (69)in life • 2 days agoRising Threat of Russia’s Cyber Warfare with Mikko HypponenRising Threat of Russia’s Cyber Warfare with Mikko Hypponen The Cybersecurity Vault — episode 35 Some of the most aggressive cyber attacks originate out of Russia. The 2022 invasion of Ukraine was…mrosenquist (69)in cybersecurity • 9 days agoCybersecurity is Adversarial – Our Failures are Attackers OpportunitiesThe Cybersecurity Vault — episode 34, with guest Chase Cunningham. We take a hard look at when organizations make big cybersecurity mistakes, how the attackers see those as opportunities, and how…mrosenquist (69)in tech • 10 days agoHow Leaders Build a Strong Security Culture and Bridge the Gap Between Psychology and CybersecurityAs the saying goes “Culture trumps strategy”, which very much holds true when it comes to cybersecurity! Pooja Shimpi, Sameer Gemawat, and I discuss strategies leaders can use to promote a robust…mrosenquist (69)in cybersecurity • 13 days agoProtecting From Cloud Based Attacks - Upcoming WebinarCloud attacks are different. Attackers can strike extremely fast using advanced techniques and automation. Is your team prepared to investigate and respond to cloud threats in less than 10 minutes…mrosenquist (69)in cryptocurrency • 13 days agoKraken Hacked by Cybersecurity ResearchersWhen cybersecurity researchers break the law, destroy their reputation, and make the bug-bounty research community look bad. TL:DR Researchers found a vulnerability in a cryptocurrency exchange.…mrosenquist (69)in cybersecurity • 20 days agoModern CISO Network: A directory of board-ready security leadersI never imagined I would see my face in the The New York Times! Yet there I am, thanks to Lacework! I am so very honored to be included in their latest edition of Modern CISO Network: A directory…mrosenquist (69)in technology • 23 days agoReality of Cybersecurity Risks for AIThe explosive growth of GenAI has serious repercussions for cybersecurity. But is the fear being overplayed in the media? What are the realistic risks and what should security and business leaders…mrosenquist (69)in cryptocurrency • 28 days agoCoinGecko Data BreachAnyone see that CoinGecko is notifying users of a data breach? Although passwords were NOT exposed, user’s names, emails, IP addresses, and other metadata like sign-up date and plan details…mrosenquist (69)in cybersecurity • 28 days agoCome join the LIVE discussion: Cybersecurity's Major Trends & Threat DynamicsLive tomorrow June 7th 2024 on LinkedIn at noon Pacific/2pm CT — Join a brand new Voice America episode of And Security For All! Matthew Rosenquist, CISO and Cybersecurity Strategist at Mercury…mrosenquist (69)in cybersecurity • 28 days agoMicrosoft Recall Cybersecurity & Privacy Risks You Need to Know About!Microsoft created Recall as a tool to benefit the user, but it has far more value to cybercriminals, hackers, data brokers, digital extortionists, and malicious insiders! In today’s video, I…mrosenquist (69)in technology • last monthThe Real Value for Operation Endgame Malware TakedownOperation Endgame has taken down a major cyber criminal infrastructure. This is important, but likely not for the reasons you may think. The multi-national law enforcement effort, led by EUROPOL…mrosenquist (69)in life • last month50 CISOs & Cybersecurity Leaders Shaping the FutureI am honored and humbled to be listed among such influential luminaries who collectively push our industry to continually adapt to make our digital ecosystem trustworthy! An incredible list of…mrosenquist (69)in news • last monthLaw Enforcement Takes Down Botnet InfrastructureEUROPOL has struck a blow to the underground botnet community with the largest ever dropper-ecosystem takedown! Over 100 servers that hosted droppers including IcedID, SystemBC, Pikabot…mrosenquist (69)in ai • last monthThe Rise and Risks of Shadow AIShadow AI, the internal use of AI tools and services without the enterprise oversight teams expressly knowing about it (ex. IT, legal, cybersecurity, compliance, and privacy teams, just to name a…mrosenquist (69)in hacking • last monthNew Cryptojacking Malware BreakdownNew Cryptojacking Malware Breakdown - The GhostEngine cryptocurrency mining malware disables endpoint security protections, deletes logs, modifies the kernel, and digs-in to establish…mrosenquist (69)in cybersecurity • last monthNorth Korea is Trying to Embed Agents into IT Positions of Western CountriesAttention IT departments, the FBI is warning US companies to be wary of inadvertently hiring North Koreans to remotely work in their IT departments, amid fears of data theft and hacking. We are…mrosenquist (69)in free • last monthFree Cybersecurity Specialist WorkshopA free workshop for students looking to become Cybersecurity Specialists!Also, if you are already a professional and want to explore a career shift to #cybersecurity , check out the live session…mrosenquist (69)in news • last monthSEC Will Require Finance to Notify Breach Victims in 30 DaysMore SEC rules, this time mandating financial firms inform victims of data breaches within 30 days! Why wasn't this already a requirement? Last year, the SEC instituted requirements for publicly…mrosenquist (69)in podcast • 2 months agoAnd Security for All Podcast 2024: Cybersecurity's Major Trends & Threat DynamicsI’m excited to be speaking live with Kim Hakim on the And Security For All podcast tomorrow to discuss 2024’s Cybersecurity’s Major Trends & Threat Dynamics, including the ever-changing role of a…mrosenquist (69)in education • 2 months agoUnlock Your Cybersecurity Career: Exclusive Discounts on Top Training Courses!There are tremendous opportunities in cybersecurity and the industry needs many more qualified workers. Training plays an important part. That is why I am partnering with Infosec4TC, an online…