mrosenquist (69)in #technology • 3 days agoMassive CrowdStrike IT Outage Has Global Implications for CybersecurityThe world experienced a digital pandemic of systems going offline and displaying the dreaded Windows Blue Screen of…mrosenquist (69)in #cybersecurity • 3 days agoAT&T Data Breach: Understanding the FalloutAs an AT&T customer, I did receive the unwelcome news that they suffered a data breach. Here is a rundown for what…mrosenquist (69)in #cybersecurity • 5 days agoRise of Aggressive Nation State ActivitiesThis is the replay of the live LinkedIn interview with Matthew Rosenquist (CISO at Mercury Risk. — Formerly Intel…mrosenquist (69)in #technology • 7 days agoGoogle Wants to Up-Sell AI Security to Gmail CustomersGoogle wants to up-sell enterprise Gmail users for AI security enhancements, when in reality the feature is mitigating…mrosenquist (69)in #cybersecurity • 13 days agoMicrosoft in Cybersecurity Leadership Crisis – Open Letter to the CEOThere is no indication that the root of Microsoft’s cybersecurity issues is being addressed. In fact, all indications…mrosenquist (69)in #privacy • 16 days agoYouTube's Deepfake Removal FeatureYouTube has announced that it will facilitate requests to remove AI generated content that is created to look or sound…mrosenquist (69)in #life • 19 days agoRising Threat of Russia’s Cyber Warfare with Mikko HypponenRising Threat of Russia’s Cyber Warfare with Mikko Hypponen The Cybersecurity Vault — episode 35 Some of the most…mrosenquist (69)in #cybersecurity • 26 days agoCybersecurity is Adversarial – Our Failures are Attackers OpportunitiesThe Cybersecurity Vault — episode 34, with guest Chase Cunningham. We take a hard look at when organizations make big…mrosenquist (69)in #tech • 28 days agoHow Leaders Build a Strong Security Culture and Bridge the Gap Between Psychology and CybersecurityAs the saying goes “Culture trumps strategy”, which very much holds true when it comes to cybersecurity! Pooja Shimpi…mrosenquist (69)in #cybersecurity • last monthProtecting From Cloud Based Attacks - Upcoming WebinarCloud attacks are different. Attackers can strike extremely fast using advanced techniques and automation. Is your…mrosenquist (69)in #cryptocurrency • last monthKraken Hacked by Cybersecurity ResearchersWhen cybersecurity researchers break the law, destroy their reputation, and make the bug-bounty research community…mrosenquist (69)in #cybersecurity • last monthModern CISO Network: A directory of board-ready security leadersI never imagined I would see my face in the The New York Times! Yet there I am, thanks to Lacework! I am so very…mrosenquist (69)in #technology • last monthReality of Cybersecurity Risks for AIThe explosive growth of GenAI has serious repercussions for cybersecurity. But is the fear being overplayed in the…mrosenquist (69)in #cryptocurrency • last monthCoinGecko Data BreachAnyone see that CoinGecko is notifying users of a data breach? Although passwords were NOT exposed, user’s names…mrosenquist (69)in #cybersecurity • 2 months agoCome join the LIVE discussion: Cybersecurity's Major Trends & Threat DynamicsLive tomorrow June 7th 2024 on LinkedIn at noon Pacific/2pm CT — Join a brand new Voice America episode of And…mrosenquist (69)in #cybersecurity • 2 months agoMicrosoft Recall Cybersecurity & Privacy Risks You Need to Know About!Microsoft created Recall as a tool to benefit the user, but it has far more value to cybercriminals, hackers, data…mrosenquist (69)in #technology • 2 months agoThe Real Value for Operation Endgame Malware TakedownOperation Endgame has taken down a major cyber criminal infrastructure. This is important, but likely not for the…mrosenquist (69)in #life • 2 months ago50 CISOs & Cybersecurity Leaders Shaping the FutureI am honored and humbled to be listed among such influential luminaries who collectively push our industry to…mrosenquist (69)in #news • 2 months agoLaw Enforcement Takes Down Botnet InfrastructureEUROPOL has struck a blow to the underground botnet community with the largest ever dropper-ecosystem takedown! Over…mrosenquist (69)in #ai • 2 months agoThe Rise and Risks of Shadow AIShadow AI, the internal use of AI tools and services without the enterprise oversight teams expressly knowing about it…