Explore
Curator's Pick
Login
Sign up
Matthew Rosenquist
1985 Followers
214 Following
California, U.S.
Cybersecurity Strategist and CISO
Blog
Comments
Replies
Connections
Wallet
@mrosenquist
0
2 days ago
cybersecurity
The Cyber Frenemy of the West: Understanding China
China is one of the most aggressive nation states when it comes to cybersecurity. They possess a renown global proficiency in attacking digital networks, harvesting sensitive…
@mrosenquist
0
3 days ago
cybersecurity
Microsoft's Recall Feature: Another Systemic Cybersecurity Failure
Microsoft has stumbled yet again. Its Recall feature — intended to enhance user experience by periodically capturing screenshots — has become a glaring example of how…
@mrosenquist
0
13 days ago
cybersecurity
Importance of Soft Skills in Cybersecurity
The Cybersecurity Vault - episode 38, with guest Evgeniy Kharam. Soft Skills are essential cybersecurity as they enable communication, teamwork, leadership, and relationship…
@mrosenquist
0
16 days ago
cybersecurity
What You Need to Know About Cybersecurity and AI
I had a great time chatting with the amazing Shira Rubinoff and Rinki Sethi on the Clarity podcast, discussing what people need to know about Cybersecurity and Artificial Intelligence!
@mrosenquist
0
25 days ago
cybersecurity
Hackers Impact Coffee Supply Chain Becomes National News
What does it say about our industry when a cybersecurity compromise that, in a software supply-chain vendor creates a minor inconvenience (forcing timecards to be written down by…
@mrosenquist
0
about 1 month ago
cybersecurity
Fraudsters Abuse DocuSign API for Legit-Looking Invoices
I didn’t see much visibility on this DocuSign hack. This is a situation where the product features were not vetted to understand if they could be misused by malicious fraudsters.…
@mrosenquist
0
about 1 month ago
cybersecurity
Joining The Cyber Express Advisory Board
I’m thrilled to join the incredible team at The Cyber Express as a member of their Editorial Advisory Board! It’s an honor to collaborate with an esteemed group of cybersecurity experts, all dedi
@mrosenquist
0
about 1 month ago
cybersecurity
Perfect Vulnerability for CISO Ultra Reliable Systems
A “Perfect” 10 vulnerability score is not what users of Cisco Ultra-Reliable Wireless Backhaul (URWB) systems were expecting. The recently discovered cybersecurity vulnerability CVE-
@mrosenquist
0
about 1 month ago
cybersecurity
Highlights from the InCyber Montreal Forum
@mrosenquist
0
about 2 months ago
cybersecurity
Malware Can Hide From Email Scanners in Virtual Hard Drives
This is an interesting tactic by cyber attackers — using virtual machine hard drive files to bypass email malware filters!<
Menu
Explore
Curator's Pick
Trade
Trade STEM