mrosenquist (69)in #technology • 13 hours agoDigital Dilemmas: Legal and Social Landscape of Ransom PaymentsDigital extortion, such as #ransomware, has aggressively grown to near epidemic levels. The sentiment of regulators…mrosenquist (69)in #ai • 15 days agoResearchers Give Birth to the First GenAI WormIt was bound to happen — researchers have created a 1st generation AI worm that can steal data, propagate malware, and…mrosenquist (69)in #ai • 18 days agoIs Digital Ethics the Control Framework that you Forgot to Establish?AI is the catalyst to prove that Digital Ethics matter more than ever! If you home catches fire, it is a…mrosenquist (69)in #cybersecurity • 21 days agoBest Practices in Securing 3rd Party Supply-Chain with Cassie CrossleyThe Cybersecurity Vault episode 28 Securing the software supply chain, including 3rd party vendors and suppliers, is…mrosenquist (69)in #cryptocurrency • 29 days agoKeynote: Critical Infrastructures Are Under Attack From Aggressive Nation StatesCritical Infrastructures are under attack from aggressive nation states! Governments must step forward to help protect…mrosenquist (69)in #technology • last monthRhysida Ransomware DecryptedI like when cybersecurity has a win! A group of brilliant South Korean security researchers found an implementation…mrosenquist (69)in #cybersecurity • last monthCybersecurity Panel at CLEAI had a great time speaking today at the CIO/CISO Executive Leadership Alliance (CLEA) meeting with Jesse Bociek and…mrosenquist (69)in #business • last monthThe Cybersecurity Vault #27 - Incident Materiality and Meeting New SEC Requirements with Malcolm HarkinsThe new SEC requirements for public companies includes reporting within 4 days of determining that a cybersecurity…mrosenquist (69)in #cybersecurity • last monthCreating A Sustainable Cybersecurity IndustryThe cybersecurity industry is facing many sustainability challenges. I enjoyed a lengthy discussion with Terry…mrosenquist (69)in #technology • 2 months agoOnline Information Session: MS Cybersecurity at Dominican University of CaliforniaDominican University of California offers a fully online, one-year, STEM-designated graduate cybersecurity program…mrosenquist (69)in #life • 2 months agoCareer Advice to Cybersecurity Students – Replay of Live PresentationI was honored to speak at the recent Cyber Proud event to an audience of students and graduates who were seeking…mrosenquist (69)in #cryptocurrency • 2 months agoThe Unseen Threats: Anticipating Cybersecurity Risks in 2024Nation-state attacks will be the dominant influence on the capabilities, growth, and impacts seen across the…mrosenquist (69)in #career • 2 months agoHelping the Next Generation of Cybersecurity ProfessionalsI was honored to speak at the Cyber Proud Event last night, to an audience of students and graduates, who were seeking…mrosenquist (69)in #bitcoin • 2 months agoBeware Fraudsters Taking Advantage of Bitcoin ETF ApprovalsThe U.S. Securities and Exchange Commission has finally approved Bitcoin ETFs! Personally, I think that is a good…mrosenquist (69)in #news • 2 months agoEmbracing Innovation and Managing Cyber RisksI had a great discussion with Julian, from eChannelNEWS where we discussed the pivotal role of information…mrosenquist (69)in #technology • 2 months agoTech Education Series #9: Are There Cybersecurity Roles That Leverage AI SkillsWelcome to the Tech Education Series, where current students and life-long learners ask questions to industry…mrosenquist (69)in #privacy • 2 months agoCarta's Reputation Crisis: How they can Rebuild TrustCarta has a full blown reputation crisis underway, but all is not lost, if the company acts in a meaningful and…mrosenquist (69)in #security • 2 months agoMost advanced hack ever and why you should be concernedOne of the most impressive hacks ever! Such tremendous sophistication is the hallmark of Nation State level attackers.…mrosenquist (69)in #cybersecurity • 2 months ago5 Biggest Mistakes of Cybersecurity ProgramsAnother year, another repeat of cybersecurity mistakes! To break the cycle and avoid them, we must learn to recognize…mrosenquist (69)in #cybersecurity • 2 months agoTech Education Series #8: What Character or Behavioral Skills are Not Adequately Being TaughtTech Education Series #8: What Character or Behavioral Skills are Not Adequately Being Taught Welcome to the Tech…