BlogHide Resteemsmrosenquist (70)in cybersecurity • 2 days agoThe Cyber Frenemy of the West: Understanding ChinaChina is one of the most aggressive nation states when it comes to cybersecurity. They possess a renown global proficiency in attacking digital networks, harvesting sensitive data, and using it to…mrosenquist (70)in cybersecurity • 3 days agoMicrosoft's Recall Feature: Another Systemic Cybersecurity FailureMicrosoft has stumbled yet again. Its Recall feature — intended to enhance user experience by periodically capturing screenshots — has become a glaring example of how well-intentioned technology can…mrosenquist (70)in cybersecurity • 8 days agoTime of Reckoning – Reviewing My 2024 Cybersecurity PredictionsThe brutal reality is that cybersecurity predictions are only as valuable as their accuracy. As 2024 comes to a close, I revisit my forecasts to assess their utility in guiding meaningful…mrosenquist (70)in cybersecurity • 13 days agoImportance of Soft Skills in CybersecurityThe Cybersecurity Vault - episode 38, with guest Evgeniy Kharam. Soft Skills are essential cybersecurity as they enable communication, teamwork, leadership, and relationship building. Yet, the…mrosenquist (70)in cybersecurity • 16 days agoWhat You Need to Know About Cybersecurity and AII had a great time chatting with the amazing Shira Rubinoff and Rinki Sethi on the Clarity podcast, discussing what people need to know about Cybersecurity and Artificial Intelligence!mrosenquist (70)in cybersecurity • 23 days agoThe Dark Side of Microsoft’s New Voice Cloning Feature: Innovation Enabling RiskMicrosoft will release a new Teams feature that allows users to clone their voice so the system can translate their conversation into different languages in real time. However, this amazing…mrosenquist (70)in cybersecurity • 25 days agoHackers Impact Coffee Supply Chain Becomes National NewsWhat does it say about our industry when a cybersecurity compromise that, in a software supply-chain vendor creates a minor inconvenience (forcing timecards to be written down by Starbucks workers)…mrosenquist (70)in cybersecurity • 29 days agoIs Cyber Threat Intelligence Worthless?I was recently asked “What do intelligence reports do? They appear worthless!” I found the question both funny and ironic. Unfortunately, I had to gently deliver some uncomfortable news. There is…mrosenquist (70)in cybersecurity • last month2024 Top 50 Thought Leaders on Risk ManagementCongrats to the Top 50 Global Thought Leaders and Influencers on Risk Management 2024! Thanks Thinkers360 for the recognition to myself and so many of the hard working colleagues in the…mrosenquist (70)in bitcoin • last monthBitcoin Has Crossed $97kBitcoin has now crossed the $97k mark! It is going absolutely bonkers right now!mrosenquist (70)in social • last monthIs Anyone Else Also Posting on Bulb?Are any of my friends, followers, and fellow Steemit readers on Bulb? There are weekly challenges and rewards for reading and posting. Referral Link to join and earn:mrosenquist (70)in cybersecurity • last monthFraudsters Abuse DocuSign API for Legit-Looking InvoicesI didn’t see much visibility on this DocuSign hack. This is a situation where the product features were not vetted to understand if they could be misused by malicious fraudsters. There is not a…mrosenquist (70)in cybersecurity • last monthJoining The Cyber Express Advisory BoardI’m thrilled to join the incredible team at The Cyber Express as a member of their Editorial Advisory Board! It’s an honor to collaborate with an esteemed group of cybersecurity experts, all…mrosenquist (70)in bitcoin • last monthThe Bull Run We Have Been Waiting For?Could this be the start of the bull run we have been waiting for? The 30 day BTC chart looks outstanding, with over 30% gains!mrosenquist (70)in cybersecurity • last monthPerfect Vulnerability for CISO Ultra Reliable SystemsA “Perfect” 10 vulnerability score is not what users of Cisco Ultra-Reliable Wireless Backhaul (URWB) systems were expecting. The recently discovered cybersecurity vulnerability CVE-2024–20418 is…mrosenquist (70)in cybersecurity • last monthHighlights from the InCyber Montreal ForumI had a tremendous time at the InCyber Montreal forum. The speakers, panels, fellow practitioners, and events were outstanding! I bumped into Dan Lohrmann and Nancy Rainosek before their panel…mrosenquist (70)in cybersecurity • 2 months agoDo CISOs Smile?How often do CISOs smile? Not very often. The role is difficult, ambiguous, and chaotic. There are immense pressures and grandiose expectations. The threat of being sacrificed on a moment’s notice…mrosenquist (70)in cybersecurity • 2 months agoMalware Can Hide From Email Scanners in Virtual Hard DrivesThis is an interesting tactic by cyber attackers — using virtual machine hard drive files to bypass email malware filters! Never underestimate the creativity and resourcefulness of intelligent…mrosenquist (70)in cybersecurity • 2 months agoSEC is Not Accepting Half-TruthsThe SEC has fined four major companies for materially misleading investors regarding cyberattacks. Tech in Trouble Regulatory actions have been brought against Unisys, Avaya, Check Point, and…mrosenquist (70)in cybersecurity • 2 months agoAre Leaders Ready to Break the Ransomware CycleIt is good to see US government leaders realize that ransomware is a growing existential threat to our country, at the hands of our adversaries. A top US national cybersecurity advisor stated in a…