mrosenquist (70)in #quantum • yesterdayMicrosoft Introduces a New Architecture for Quantum ComputersThe world is abuzz with Microsoft’s announcement today of the introduction of their Majorana 1 chip. It could…mrosenquist (70)in #cybersecurity • 4 days agoCybersecurity Perspectives for 2025 – Rinki SethiThe Cybersecurity Vault — episode 44, with guest Rinki Sethi. 2025 will be an interesting year for the cybersecurity…mrosenquist (70)in #cybersecurity • 8 days agoCybersecurity Rant - Senselessly Repeating MistakesWe often complain how tough cybersecurity is, yet we often make the same mistakes again and again. It’s true…mrosenquist (70)in #cybersecurity • 9 days agoFrom DEAD story to DREAM job: THE DIFFERENT story of CYBERSECURITYPodcast “THE DIVERSITY CHANGER!” Episode 24 Welcome to another exciting episode of Diversity is the Game Changer! In…mrosenquist (70)in #cybersecurity • 10 days agoSecuring the Future Against Geopolitical Cyber Risks panelGlobal politics is on fire and impacting #cybersecurity! I have a stellar list of panelists aligned to discuss the…mrosenquist (70)in #cybersecurity • 14 days agoRansomware is Down but Not OutRansomware payments are down according to Chainalysis, but it may be a little too early to celebrate. The good news…mrosenquist (70)in #cybersecurity • 17 days agoStrategic Insights of Cybersecurity – Career, Threats, AI, and AdviceA fantastic discussion covering: Career Lessons & Leadership – Pursuing Impossible Problems Strategic Insights of…mrosenquist (70)in #cybersecurity • 21 days agoHealthcare Crisis Emerges: Cybersecurity Vulnerabilities in Patient Monitors Confirmed by FDAFor over a decade, we warned the healthcare industry this was coming. They ignored us. Their sole focus was HIPAA…mrosenquist (70)in #cybersecurity • 22 days agoTop 100 B2B Thought Leaders, Analysts & InfluencersI am honored to be recognized by Thinkers360 as one of the "Top 100 B2B Thought Leaders, Analysts & Influencers You…mrosenquist (70)in #cybersecurity • 23 days agoThe Data Diva Talks Privacy PodcastI had such a wonderful conversation with Debbie Reynolds on here podcast "The Data Diva Talks Privacy". Cybersecurity…mrosenquist (70)in #cybersecurity • 23 days agoA Top Cybersecurity Career CoachWho is this cybersecurity guy on a New York Times Square billboard? Thanks topmate.io for the recognition of being one…mrosenquist (70)in #cybersecurity • 27 days agoThe Cybersecurity Vault Podcast 2024 RecapMy deepest appreciation to all the incredible cybersecurity luminaries who joined The Cybersecurity Vault podcast last…mrosenquist (70)in #cybersecurity • 28 days ago10 Cybersecurity Predictions for 2025Every year I trudge into the analysis and release my #cybersecurity predictions. Here is a quick infographic of the…mrosenquist (70)in #cybersecurity • last monthCybersecurity Perspectives for 2025 – Insights from David HahnThe Cybersecurity Vault — episode 43, with guest David Hahn. 2025 will be an interesting year for the cybersecurity…mrosenquist (70)in #cybersecurity • last month10 Cybersecurity Predictions for 2025The cybersecurity landscape is poised for transformation in 2025. The rapid evolution of technology, coupled with the…mrosenquist (70)in #cybersecurity • last monthTop 50 Cybersecurity MentorsMentorship is crucial in cybersecurity. I am honored to be listed on TopMate’s Top 50 Cybersecurity Mentors in the US…mrosenquist (70)in #cybersecurity • last monthCybersecurity Perspectives for 2025 – Interviews with Experts: Gary Hayslip2025 cybersecurity insights with Gary Hayslip! Gary provides his insights to the challenges and opportunities the…mrosenquist (70)in #cybersecurity • last monthCybersecurity Perspectives 2025 – Interviews with Experts: Dan LohrmannThe Cybersecurity Vault - episode 41, with guest Dan Lohrmann. 2025 will be an interesting year for the…mrosenquist (70)in #cybersecurity • last monthPersonal AI Supercomputers are a RealityWe get closer every quarter to being able to functionally accomplish real-time deepfake capabilities from our phones -…mrosenquist (70)in #cybersecurity • last monthThe Psychology of Phishing Attackers are masterful at using Social Engineering techniques to victimize others. Sumona, the founder of the…