Explore
Curator's Pick
Login
Sign up
neoxian
stem
science
proofofbrain
ecency
technology
hive-196387
waivio
cent
stemgeeks
palnet
archon
pob
creativecoin
vyb
appreciator
ctp
photography
ocd
waiv
pepe
hive-193084
stemsocial
health
spanish
hive-163521
hive-167922
blog
pimp
spt
amazingnature
photofeed
hive-130906
math
ocdb
tech
education
hive
indiaunited
hive-engine
#cybersecurity
Trending Posts
@mrosenquist
0
2 days ago
cybersecurity
The Cyber Frenemy of the West: Understanding China
China is one of the most aggressive nation states when it comes to cybersecurity. They possess a renown global proficiency in attacking digital networks, harvesting sensitive…
@mrosenquist
0
3 days ago
cybersecurity
Microsoft's Recall Feature: Another Systemic Cybersecurity Failure
Microsoft has stumbled yet again. Its Recall feature — intended to enhance user experience by periodically capturing screenshots — has become a glaring example of how…
@mrosenquist
0
10 months ago
ai
Researchers Give Birth to the First GenAI Worm
It was bound to happen — researchers have created a 1st generation AI worm that can steal data, propagate malware, and spread via email. Ben Nassi from Cornell Tech, Stav Cohen fro
@mrosenquist
0
10 months ago
ai
Is Digital Ethics the Control Framework that you Forgot to Establish?
AI is the catalyst to prove that Digital Ethics matter more than ever! If you home catches fire, it is a little late to consider implementing smoke detectors. The sa
@mrosenquist
0
5 months ago
blockchain
California DMV Implementing Blockchain Tech
California’s Department of Motor Vehicles will
@mrosenquist
0
10 months ago
business
The Cybersecurity Vault #27 - Incident Materiality and Meeting New SEC Requirements with Malcolm Harkins
The new SEC requirements for public companies includes reporting within 4 days of determining that a cybersecurity incident is ‘material’ to the company. But what is materiality…
@mrosenquist
0
5 months ago
business
Lessons Learned from the CrowdStrike Outage
The recent CrowdStrike outage provides valuable lessons in how to avoid causing problems and being more resilient when faced with 3rd party vendor issues. CEOs, CIOs, and Board…
@mrosenquist
0
10 months ago
cryptocurrency
Keynote: Critical Infrastructures Are Under Attack From Aggressive Nation States
Critical Infrastructures are under attack from aggressive nation states! Governments must step forward to help protect these crucial sectors and the services they provide to…
@mrosenquist
0
11 months ago
cryptocurrency
The Unseen Threats: Anticipating Cybersecurity Risks in 2024
Nation-state attacks will be the dominant influence on the capabilities, growth, and impacts seen across the cybersecurity industry in 2024. Years of investment, innovation, and…
@mrosenquist
0
12 months ago
cybersecurity
An In-Depth Look at the Evolution and Future of Cybersecurity
Thanks Carson Spitzke, from Smartech Daily, for writing up a discussion on how the cybersecurity industry is evolving and the big challenges we will be facing in th
Menu
Explore
Curator's Pick
Trade
Trade STEM