• Explore
  • Curator's Pick
  • Login
  • Sign up
stem neoxian hive-130906 science archon stemsocial waivio waiv natureobserver insect palnet ctp proofofbrain nature hive-111030 vyb hive-196387 ecency inleo discovery-it cent hive space flower scifi-verse technology photography india astronomy math hiveengine astrophysics pob stemgeeks chessbrothers education photos moth vectors scifimultiverse

#cybersecurity

avatar
@mrosenquist 0
6 days ago
cybersecurity
2026 Cybersecurity prediction #2 - AI Accelerates Vulnerability Exploitation 2026 Cybersecurity prediction #2 (of the Top 10) - AI Accelerates Vulnerability Exploitation.Automated discovery and exploit generation at machine speed shrinks time-to-patch window
13
0
0
13.512 STEM
avatar
@vinay-2787-p 0
about 21 hours ago
cybersecurity
How to know if your SOC is really working- and what to do when it isn’t Security Operations Centers (SOCs) are the front line for detecting and responding to cyber threats. Yet many organisations treat a SOC like a checkbox- a set of tools, a console…
1
2
0
0.000 STEM
avatar
@jackfro 0
5 days ago
Freewriters
Can AI hack? Can AI Hack? Exploring the Intersection of Artificial Intelligence and Cybersecurity The question "Can AI hack?" has become increasingly relevant as artificial intelligence…
1
0
0
0.000 STEM
avatar
@hangerio 0
4 months ago
cybersecurity
Tool Tuesday: Your Password Is "123456"? pexels Write Yes in comment section if this is you: Using same password fo
2
4
1
0.000 STEM
avatar
@mrosenquist 0
over 1 year ago
cybersecurity
Speaking at the User Conference in San Diego CA I’m thrilled to be a part of the ManageEngine User Conference in San Diego CA on Sept 19th & 20th. I'm speaking in the IT Security track, discussing the top threats to…
37
0
2
25.647 STEM
avatar
@mrosenquist 0
over 1 year ago
technology
Hacked Hezbollah Pagers Exploding Tampering with pagers, turning them into a targeted improvised explosive device, has implications to cybersecurity and supply chain security. It is a bol
39
0
2
27.183 STEM
avatar
@mrosenquist 0
over 1 year ago
life
Locked In - The Cybersecurity Event of the Year This is how to redefine CISO events! I had a spectacular time at the “Locked In — The Cybersecurity Event of the Year!” Organized by Rinki Sethi and Lucas Moody, it was nothing…
33
0
1
32.884 STEM
avatar
@mrosenquist 0
over 1 year ago
cybersecurity
Empowering the Modern CISO: Leading the C-Suite & Boardroom with a Bold Digital Agenda The expectations of CISOs are rising and their influence must resonate with C-Suite and Boardroom audiences. I am excited at moderating a panel at the upcoming HMGStrategy 16th…
28
0
1
19.472 STEM
avatar
@mrosenquist 0
over 1 year ago
cybersecurity
SECURITYbreak podcast - The Even Darker Side of CyberCrime w/ Matthew Rosenquist I had a great discussion on the SECURITYbreak podcast talking about security vulnerability research impacting Apple vision pro VR headsets, MasterCard’s acquisition of threat…
47
0
2
29.527 STEM
avatar
@macchiata 0
over 1 year ago
Learn2code
My Self-Taught Journey - Cybersecurity Courses Hey everyone! It has been a while since I am sharing my learning journey. Since now I can have more time focusing
343
0
1
94.192 STEM
Menu
Explore Curator's Pick
Trade
Trade STEM Swap