New: cybersecurityAll contenthive-129948krhive-196917zzanhive-183959hive-185836hive-180932steemhive-166405hive-144064hive-150122hive-101145uncommonlabhive-188619hive-183397bitcoinhive-184714hive-145157photographykrsuccesshive-193637hive-180301hive-103599lifehive-180106TrendingNewHotLikersmrosenquist (70)in cybersecurity • 9 hours agoCybersecurity Perspectives 2025 – Interviews with Experts: Dan LohrmannThe Cybersecurity Vault - episode 41, with guest Dan Lohrmann. 2025 will be an interesting year for the cybersecurity industry! Dan Lohrmann provides his insights to the challenges and…mrosenquist (70)in cybersecurity • 2 days agoPersonal AI Supercomputers are a RealityWe get closer every quarter to being able to functionally accomplish real-time deepfake capabilities from our phones - which will usher in a new era of fraud. The miniaturization of very powerful AI…mrosenquist (70)in cybersecurity • 3 days agoThe Psychology of Phishing Attackers are masterful at using Social Engineering techniques to victimize others. Sumona, the founder of the MindShield institute, outlines the challenges of adapting to avoid online…osizaifuturist (34)in technology • 3 days agoCyber securityAs we step into 2025, the industry of cyber threats is evolving at lightning speed. From AI-driven attacks to ransomware, your business must be prepared to face increasingly sophisticated risks.…mrosenquist (70)in cybersecurity • 4 days agoThe Psychology of Phishing: Why Smart People Fall for Dumb TricksThe Cybersecurity Vault — episode 40, with guest Sumona Banerji Attackers are masterful at using Social Engineering techniques to victimize others. They take advantage of vulnerabilities that are…marinchtein (31)in stuxnet • 4 days agoThe Fascinating Story of Stuxnet: History's Most Sophisticated VirusHi guys, For my first article on Steem, I would like to share with you a fabulous and intriguing story—the history of one of the most important and sophisticated computer viruses in history:…secpoint (49)in ddac • 7 days agoSecPoint at DDAC📢 Join SecPoint at the Danish Defence Annual Conference (DDAC) 2025! We’re excited to announce that SecPoint will be participating in the Danish Defence Annual Conference (DDAC) on 21-22 January…secpoint (49)in secpoint • 7 days agoSecPoint Penetrator Vulnerability Scanner Scanning via Another Network Adapter ExplanationSecPoint Penetrator Vulnerability Scanner Scanning via Another Network Adapter Explanation #secpoint #secpointpenetrator #vapt #cybersec #cybersecuritymrosenquist (70)in cybersecurity • 8 days agoCybersecurity Misuse vs Technical VulnerabilityOne of my 2025 cybersecurity predictions is we will see more victimization through the use of products and services which don’t have a technical vulnerability, but rather design features which can…mrosenquist (70)in cybersecurity • 11 days agoThe CISO's Role: Evolving Expectations In CybersecurityThe rapidly evolving expectations of cybersecurity are pushing CISOs to adapt and demonstrate greater value to their organizations. This session explores the changing role of the CISO heading into…secpoint (49)in secpoint • 11 days ago✨ From all of us at SecPoint, we wish you a Happy New Year 2025! ✨✨ From all of us at SecPoint, we wish you a Happy New Year 2025! ✨ May the year ahead bring you health, prosperity, and new opportunities for growth and success. We're grateful for your trust and…sorensky (28)in socks5 • 11 days agoSocks5 Proxy Configuration and Cross-Border E-Commerce Network Building1. Why do cross-border e-commerce companies need to pay attention to Porfiles configuration? Cross-border e-commerce plays a key role in the expansion of the global market. However, this field is…amy24 (34)in cybersecurity • 12 days agoGovernment and Non-Profit Web Development: Building Accessible and Secure Public Service WebsitesConsider the following scenario: a citizen needs critical healthcare information but finds a government website too difficult to navigate. Or a nonprofit donor wants to contribute but hesitates due…mrosenquist (70)in cybersecurity • 13 days agoHere's my 2024 LinkedIn RewindHere’s my 2024 LinkedIn Rewind, as created by Coauthor.studio: 2024 Highlights: • Named Top 10 Cybersecurity Thought Leader by Thinkers360 and made the top cybersecurity ranking lists by CS Hub…mrosenquist (70)in cybersecurity • 15 days agoTop 25 B2B Tech Influencers for 2025I am deeply honored and thrilled to be recognized this year by Clutch as part of an elite community of technology leaders and influencers. This is an incredible list of influencers who have…amy24 (34)in fintech • 15 days agoThe Ultimate Guide to Secure Fintech Web Applications: Building Trust Through Safety and ComplianceIn this teeming digital marketplace, fintech applications are changing how humans handle finances. Yet, this revolution brings with it its own set of challenges, especially in terms of security and…virtu (30)in axiomalchemists • 19 days agoWelcome to AXIOM ALCHEMISTS I am VIRTU and this i my first official post"Get Ready! Axiom Alchemists, founded by yours truly, is launching our YouTube channel (@AxiomAlchemists) TODAY, December 21st, 2025! 💥 We'll dive deep into Science, Cybersecurity, Art, and the…secpoint (49)in secpoint • 21 days agohttps://www.youtube.com/watch?v=I0QuOAkZB3M Merry Christmas and a joyful holiday season!Merry Christmas and a joyful holiday season! #SecPoint #MerryChristmas #HappyHolidays #CyberSecurity #SeasonGreetingsmrosenquist (70)in cybersecurity • 21 days agoThe Cyber Frenemy of the West: Understanding ChinaChina is one of the most aggressive nation states when it comes to cybersecurity. They possess a renown global proficiency in attacking digital networks, harvesting sensitive data, and using it to…mrosenquist (70)in cybersecurity • 23 days agoMicrosoft's Recall Feature: Another Systemic Cybersecurity FailureMicrosoft has stumbled yet again. Its Recall feature — intended to enhance user experience by periodically capturing screenshots — has become a glaring example of how well-intentioned technology can…