mrosenquist (69)in #cybersecurity • 5 days agoCybersecurity is Adversarial – Our Failures are Attackers OpportunitiesThe Cybersecurity Vault — episode 34, with guest Chase Cunningham. We take a hard look at when organizations make big…mrosenquist (69)in #tech • 7 days agoHow Leaders Build a Strong Security Culture and Bridge the Gap Between Psychology and CybersecurityAs the saying goes “Culture trumps strategy”, which very much holds true when it comes to cybersecurity! Pooja Shimpi…mrosenquist (69)in #cybersecurity • 10 days agoProtecting From Cloud Based Attacks - Upcoming WebinarCloud attacks are different. Attackers can strike extremely fast using advanced techniques and automation. Is your…mrosenquist (69)in #cryptocurrency • 10 days agoKraken Hacked by Cybersecurity ResearchersWhen cybersecurity researchers break the law, destroy their reputation, and make the bug-bounty research community…mrosenquist (69)in #cybersecurity • 17 days agoModern CISO Network: A directory of board-ready security leadersI never imagined I would see my face in the The New York Times! Yet there I am, thanks to Lacework! I am so very…mrosenquist (69)in #technology • 20 days agoReality of Cybersecurity Risks for AIThe explosive growth of GenAI has serious repercussions for cybersecurity. But is the fear being overplayed in the…mrosenquist (69)in #cryptocurrency • 24 days agoCoinGecko Data BreachAnyone see that CoinGecko is notifying users of a data breach? Although passwords were NOT exposed, user’s names…mrosenquist (69)in #cybersecurity • 25 days agoCome join the LIVE discussion: Cybersecurity's Major Trends & Threat DynamicsLive tomorrow June 7th 2024 on LinkedIn at noon Pacific/2pm CT — Join a brand new Voice America episode of And…mrosenquist (69)in #cybersecurity • 25 days agoMicrosoft Recall Cybersecurity & Privacy Risks You Need to Know About!Microsoft created Recall as a tool to benefit the user, but it has far more value to cybercriminals, hackers, data…mrosenquist (69)in #technology • 27 days agoThe Real Value for Operation Endgame Malware TakedownOperation Endgame has taken down a major cyber criminal infrastructure. This is important, but likely not for the…mrosenquist (69)in #life • 27 days ago50 CISOs & Cybersecurity Leaders Shaping the FutureI am honored and humbled to be listed among such influential luminaries who collectively push our industry to…mrosenquist (69)in #news • last monthLaw Enforcement Takes Down Botnet InfrastructureEUROPOL has struck a blow to the underground botnet community with the largest ever dropper-ecosystem takedown! Over…mrosenquist (69)in #ai • last monthThe Rise and Risks of Shadow AIShadow AI, the internal use of AI tools and services without the enterprise oversight teams expressly knowing about it…mrosenquist (69)in #hacking • last monthNew Cryptojacking Malware BreakdownNew Cryptojacking Malware Breakdown - The GhostEngine cryptocurrency mining malware disables endpoint security…mrosenquist (69)in #cybersecurity • last monthNorth Korea is Trying to Embed Agents into IT Positions of Western CountriesAttention IT departments, the FBI is warning US companies to be wary of inadvertently hiring North Koreans to remotely…mrosenquist (69)in #free • last monthFree Cybersecurity Specialist WorkshopA free workshop for students looking to become Cybersecurity Specialists!Also, if you are already a professional and…mrosenquist (69)in #news • last monthSEC Will Require Finance to Notify Breach Victims in 30 DaysMore SEC rules, this time mandating financial firms inform victims of data breaches within 30 days! Why wasn't this…mrosenquist (69)in #podcast • 2 months agoAnd Security for All Podcast 2024: Cybersecurity's Major Trends & Threat DynamicsI’m excited to be speaking live with Kim Hakim on the And Security For All podcast tomorrow to discuss 2024’s…mrosenquist (69)in #education • 2 months agoUnlock Your Cybersecurity Career: Exclusive Discounts on Top Training Courses!There are tremendous opportunities in cybersecurity and the industry needs many more qualified workers. Training…mrosenquist (69)in #cybersecurity • 2 months agoUnlocking SMB Cybersecurity: The Rise of Virtual CISOs in 2024 and BeyondThis year, virtual CISOs must begin making a difference in our industry. For the longest time, small and medium…