BlogHide Resteemsmrosenquist (70)in bitcoin • 7 hours agoBitcoin Has Crossed $97kBitcoin has now crossed the $97k mark! It is going absolutely bonkers right now!mrosenquist (70)in social • 6 days agoIs Anyone Else Also Posting on Bulb?Are any of my friends, followers, and fellow Steemit readers on Bulb? There are weekly challenges and rewards for reading and posting. Referral Link to join and earn:mrosenquist (70)in cybersecurity • 9 days agoFraudsters Abuse DocuSign API for Legit-Looking InvoicesI didn’t see much visibility on this DocuSign hack. This is a situation where the product features were not vetted to understand if they could be misused by malicious fraudsters. There is not a…mrosenquist (70)in cybersecurity • 10 days agoJoining The Cyber Express Advisory BoardI’m thrilled to join the incredible team at The Cyber Express as a member of their Editorial Advisory Board! It’s an honor to collaborate with an esteemed group of cybersecurity experts, all…mrosenquist (70)in bitcoin • 10 days agoThe Bull Run We Have Been Waiting For?Could this be the start of the bull run we have been waiting for? The 30 day BTC chart looks outstanding, with over 30% gains!mrosenquist (70)in cybersecurity • 13 days agoPerfect Vulnerability for CISO Ultra Reliable SystemsA “Perfect” 10 vulnerability score is not what users of Cisco Ultra-Reliable Wireless Backhaul (URWB) systems were expecting. The recently discovered cybersecurity vulnerability CVE-2024–20418 is…mrosenquist (70)in cybersecurity • 14 days agoHighlights from the InCyber Montreal ForumI had a tremendous time at the InCyber Montreal forum. The speakers, panels, fellow practitioners, and events were outstanding! I bumped into Dan Lohrmann and Nancy Rainosek before their panel…mrosenquist (70)in cybersecurity • 17 days agoDo CISOs Smile?How often do CISOs smile? Not very often. The role is difficult, ambiguous, and chaotic. There are immense pressures and grandiose expectations. The threat of being sacrificed on a moment’s notice…mrosenquist (70)in cybersecurity • 29 days agoMalware Can Hide From Email Scanners in Virtual Hard DrivesThis is an interesting tactic by cyber attackers — using virtual machine hard drive files to bypass email malware filters! Never underestimate the creativity and resourcefulness of intelligent…mrosenquist (70)in cybersecurity • 29 days agoSEC is Not Accepting Half-TruthsThe SEC has fined four major companies for materially misleading investors regarding cyberattacks. Tech in Trouble Regulatory actions have been brought against Unisys, Avaya, Check Point, and…mrosenquist (70)in cybersecurity • last monthAre Leaders Ready to Break the Ransomware CycleIt is good to see US government leaders realize that ransomware is a growing existential threat to our country, at the hands of our adversaries. A top US national cybersecurity advisor stated in a…mrosenquist (70)in cybersecurity • last monthThe Latest Cybersecurity Vault InterviewsThe most influential cybersecurity experts discuss adversaries, risks, cyber warfare, and supply chain outages on the Cybersecurity Insights podcast! Reality of Cybersecurity Risks for AI — Ejona…mrosenquist (70)in cybersecurity • last monthFraudulent Worker Schemes Lead to CyberattacksSecureworks released a report detailing how North Korean attackers are targeting western countries with a new tactic. Attackers are fraudulently obtaining positions so they can victimize the…mrosenquist (70)in cybersecurity • last monthRising Cyber Aggression from Nation StatesThere are big predators in our digital world. In recent keynotes I have been talking about the big 4 aggressive nation states and how they are heavily investing in offensive cyber capabilities that…mrosenquist (70)in cybersecurity • last monthDeconstructing Ransomware SeriesRansomware attacks are vicious, expensive, impactful, and becoming commonplace. So, let's take a look at what Ransomware is, how attacks typically unfold, and what potential victims can do to…mrosenquist (70)in cybersecurity • last monthDo CISOs Want to Split Their RoleA recent report by Trellix indicated that due to growing complexity, responsibility, and regulatory accountability, a majority of CISOs believe their role should be split into separate positions.…mrosenquist (70)in cybersecurity • last monthExplaining Cybersecurity - Vizitek Interface OverviewExplaining cybersecurity is challenging, but with the right visual interface, it is easier to understand the behavioral, technical, and process aspects of cyberattacks. For the full video…mrosenquist (70)in cybersecurity • last monthInCyber Forum Canada 2024The InCyber Forum Canada 2024 conference is an outstanding event, packed with multiple stages, many thought-leadership panels, and an expansive array of vendors showcasing their latest innovation.…mrosenquist (70)in cybersecurity • last monthEmpowering the Modern CISO: Leading the C-Suite & BoardroomI had a fantastic time moderating an expert panel at the HMG Strategy 16h Annual Silicon Valley C-Level Technology Leadership Summit! The panel, “Empowering the Modern CISO: Leading the C-Suite &…mrosenquist (70)in cybersecurity • last monthLeading a Panel for CISOsI am looking forward to moderating an expert panel at the HMG Strategy 16th Annual Silicon Valley C-Level Technology Leadership Summit, tomorrow on Tues Oct 8th 2024! The panel will discuss:…