BlogHide Resteemsmrosenquist (70)in cybersecurity • 3 hours ago10 Cybersecurity Predictions for 2025The cybersecurity landscape is poised for transformation in 2025. The rapid evolution of technology, coupled with the increasing sophistication of threat actors, presents a future that is both…mrosenquist (70)in cybersecurity • 7 days agoTop 50 Cybersecurity MentorsMentorship is crucial in cybersecurity. I am honored to be listed on TopMate’s Top 50 Cybersecurity Mentors in the US list! Leveraging the knowledge, experience, and connections of those who have a…mrosenquist (70)in cybersecurity • 7 days agoCybersecurity Perspectives for 2025 – Interviews with Experts: Gary Hayslip2025 cybersecurity insights with Gary Hayslip! Gary provides his insights to the challenges and opportunities the cybersecurity industry will face in 2025! In this podcast series we talk with the…mrosenquist (70)in cybersecurity • 11 days agoCybersecurity Perspectives 2025 – Interviews with Experts: Dan LohrmannThe Cybersecurity Vault - episode 41, with guest Dan Lohrmann. 2025 will be an interesting year for the cybersecurity industry! Dan Lohrmann provides his insights to the challenges and…mrosenquist (70)in cybersecurity • 12 days agoPersonal AI Supercomputers are a RealityWe get closer every quarter to being able to functionally accomplish real-time deepfake capabilities from our phones - which will usher in a new era of fraud. The miniaturization of very powerful AI…mrosenquist (70)in cybersecurity • 13 days agoThe Psychology of Phishing Attackers are masterful at using Social Engineering techniques to victimize others. Sumona, the founder of the MindShield institute, outlines the challenges of adapting to avoid online…mrosenquist (70)in cybersecurity • 15 days agoThe Psychology of Phishing: Why Smart People Fall for Dumb TricksThe Cybersecurity Vault — episode 40, with guest Sumona Banerji Attackers are masterful at using Social Engineering techniques to victimize others. They take advantage of vulnerabilities that are…mrosenquist (70)in cybersecurity • 19 days agoCybersecurity Misuse vs Technical VulnerabilityOne of my 2025 cybersecurity predictions is we will see more victimization through the use of products and services which don’t have a technical vulnerability, but rather design features which can…mrosenquist (70)in cybersecurity • 21 days agoThe CISO's Role: Evolving Expectations In CybersecurityThe rapidly evolving expectations of cybersecurity are pushing CISOs to adapt and demonstrate greater value to their organizations. This session explores the changing role of the CISO heading into…mrosenquist (70)in cybersecurity • 24 days agoHere's my 2024 LinkedIn RewindHere’s my 2024 LinkedIn Rewind, as created by Coauthor.studio: 2024 Highlights: • Named Top 10 Cybersecurity Thought Leader by Thinkers360 and made the top cybersecurity ranking lists by CS Hub…mrosenquist (70)in cybersecurity • 25 days agoTop 25 B2B Tech Influencers for 2025I am deeply honored and thrilled to be recognized this year by Clutch as part of an elite community of technology leaders and influencers. This is an incredible list of influencers who have…mrosenquist (70)in cybersecurity • last monthThe Cyber Frenemy of the West: Understanding ChinaChina is one of the most aggressive nation states when it comes to cybersecurity. They possess a renown global proficiency in attacking digital networks, harvesting sensitive data, and using it to…mrosenquist (70)in cybersecurity • last monthMicrosoft's Recall Feature: Another Systemic Cybersecurity FailureMicrosoft has stumbled yet again. Its Recall feature — intended to enhance user experience by periodically capturing screenshots — has become a glaring example of how well-intentioned technology can…mrosenquist (70)in cybersecurity • last monthTime of Reckoning – Reviewing My 2024 Cybersecurity PredictionsThe brutal reality is that cybersecurity predictions are only as valuable as their accuracy. As 2024 comes to a close, I revisit my forecasts to assess their utility in guiding meaningful…mrosenquist (70)in cybersecurity • last monthImportance of Soft Skills in CybersecurityThe Cybersecurity Vault - episode 38, with guest Evgeniy Kharam. Soft Skills are essential cybersecurity as they enable communication, teamwork, leadership, and relationship building. Yet, the…mrosenquist (70)in cybersecurity • 2 months agoWhat You Need to Know About Cybersecurity and AII had a great time chatting with the amazing Shira Rubinoff and Rinki Sethi on the Clarity podcast, discussing what people need to know about Cybersecurity and Artificial Intelligence!mrosenquist (70)in cybersecurity • 2 months agoThe Dark Side of Microsoft’s New Voice Cloning Feature: Innovation Enabling RiskMicrosoft will release a new Teams feature that allows users to clone their voice so the system can translate their conversation into different languages in real time. However, this amazing…mrosenquist (70)in cybersecurity • 2 months agoHackers Impact Coffee Supply Chain Becomes National NewsWhat does it say about our industry when a cybersecurity compromise that, in a software supply-chain vendor creates a minor inconvenience (forcing timecards to be written down by Starbucks workers)…mrosenquist (70)in cybersecurity • 2 months agoIs Cyber Threat Intelligence Worthless?I was recently asked “What do intelligence reports do? They appear worthless!” I found the question both funny and ironic. Unfortunately, I had to gently deliver some uncomfortable news. There is…mrosenquist (70)in cybersecurity • 2 months ago2024 Top 50 Thought Leaders on Risk ManagementCongrats to the Top 50 Global Thought Leaders and Influencers on Risk Management 2024! Thanks Thinkers360 for the recognition to myself and so many of the hard working colleagues in the…