Explore
Curator's Pick
Login
Sign up
neoxian
stem
science
technology
archon
stemsocial
palnet
waivio
hive-130906
photography
hive-196387
ecency
cent
creativecoin
proofofbrain
education
math
spanish
hive-128780
vyb
pimp
hive-engine
ocd
conspiracy
pob
ctp
stem-espanol
leofinance
hive-167922
stemgeeks
discovery-it
insect
waiv
scifimultiverse
deepdives
hive-111030
chessbrothers
calculus
vectors
leo
#hacking
Trending Posts
@mrosenquist
0
12 months ago
cybersecurity
Rising Cyber Aggression from Nation States
There are big predators in our digital world. In recent keynotes I have been talking about the big 4 aggressive nation states and how they are heavily investing in offensive…
@mrosenquist
0
12 months ago
cybersecurity
Are Leaders Ready to Break the Ransomware Cycle
It is good to see US government leaders realize that ransomware is a growing existential threat to our country, at the hands of our adversaries. A top US national cybersecurity advisor
@mrosenquist
0
12 months ago
cybersecurity
Malware Can Hide From Email Scanners in Virtual Hard Drives
This is an interesting tactic by cyber attackers — using virtual machine hard drive files to bypass email malware filters!<
@mrosenquist
0
10 months ago
cybersecurity
The Cyber Frenemy of the West: Understanding China
China is one of the most aggressive nation states when it comes to cybersecurity. They possess a renown global proficiency in attacking digital networks, harvesting sensitive…
@graylinestrider
0
10 months ago
nsfw
Reveal this post
@mrosenquist
0
9 months ago
cybersecurity
The Psychology of Phishing
Attackers are masterful at using Social Engineering techniques to victimize others. Sumona, the founder of the MindShield institute, outlines the challenges of adapting to…
@mrosenquist
0
9 months ago
cybersecurity
10 Cybersecurity Predictions for 2025
Every year I trudge into the analysis and release my #cybersecurity predictions. Here is a quick infographic of the top 10 for 2025. Read the full report for all the…
@mrosenquist
0
6 months ago
cybersecurity
Simplifying Cyber Safety for Everyone with Sandra Estok
Cybersecurity is not just a technical endeavor. Attackers often pursue people to either gain access to valuable systems or to directly victimize them. This includes companies…
@mrosenquist
0
6 months ago
cybersecurity
Cybercriminals Can Easily Adopt New Tech
Sandra Estok discusses how cybercriminals are not burdened by rules when it comes to leveraging new technologies. They quickly adapt new tech in pursuit of their malicious…
@mrosenquist
0
6 months ago
cybersecurity
Cybercrime Follows the Path of Least Resistance
We must always look at our cybersecurity defenses from the viewpoint of those attacking them! Here is a clip from my recent interview with HMG Global Viewpoint, talking about the…
Menu
Explore
Curator's Pick
Trade
Trade STEM
Swap