Explore
Curator's Pick
Login
Sign up
neoxian
stem
science
ecency
technology
proofofbrain
waivio
cent
creativecoin
archon
palnet
hive-196387
vyb
stemgeeks
pob
hive-163521
stemsocial
photography
education
pimp
ctp
appreciator
math
inleo
hive-130906
ocd
hive-engine
piotr
spt
waiv
stem-espanol
nature
bbh
space
conspiracy
deepdives
blog
hive-167922
truth
spanish
#hacking
Trending Posts
@mrosenquist
0
about 1 year ago
cryptocurrency
Keynote: Critical Infrastructures Are Under Attack From Aggressive Nation States
Critical Infrastructures are under attack from aggressive nation states! Governments must step forward to help protect these crucial sectors and the services they provide to…
@mrosenquist
0
about 1 year ago
cryptocurrency
The Unseen Threats: Anticipating Cybersecurity Risks in 2024
Nation-state attacks will be the dominant influence on the capabilities, growth, and impacts seen across the cybersecurity industry in 2024. Years of investment, innovation, and…
@mrosenquist
0
3 months ago
cybersecurity
The Cyber Frenemy of the West: Understanding China
China is one of the most aggressive nation states when it comes to cybersecurity. They possess a renown global proficiency in attacking digital networks, harvesting sensitive…
@mrosenquist
0
5 months ago
cybersecurity
Malware Can Hide From Email Scanners in Virtual Hard Drives
This is an interesting tactic by cyber attackers — using virtual machine hard drive files to bypass email malware filters!<
@mrosenquist
0
5 months ago
cybersecurity
Rising Cyber Aggression from Nation States
There are big predators in our digital world. In recent keynotes I have been talking about the big 4 aggressive nation states and how they are heavily investing in offensive…
@mrosenquist
0
2 months ago
cybersecurity
The Psychology of Phishing
Attackers are masterful at using Social Engineering techniques to victimize others. Sumona, the founder of the MindShield institute, outlines the challenges of adapting to…
@mrosenquist
0
9 months ago
cybersecurity
Come join the LIVE discussion: Cybersecurity's Major Trends & Threat Dynamics
Live tomorrow June 7th 2024 on LinkedIn at noon Pacific/2pm CT — Join a brand new Voice America episode of And Security For All! Matthew Rosenquist, CISO and Cybersecur
@mrosenquist
0
11 months ago
cybersecurity
Task Force Gives Terrible Advice About Ransomware
I couldn’t help myself, I had to rant about this! A ‘security research’ group is recommending against banning ransomware payments, which would eradicate these attacks from…
@mrosenquist
0
5 months ago
cybersecurity
Are Leaders Ready to Break the Ransomware Cycle
It is good to see US government leaders realize that ransomware is a growing existential threat to our country, at the hands of our adversaries. A top US national cybersecurity advisor
@mrosenquist
0
about 1 year ago
cybersecurity
Best Practices in Securing 3rd Party Supply-Chain with Cassie Crossley
The Cybersecurity Vault episode 28 Securing the software supply chain, including 3rd party vendors and suppliers, is a difficult problem that the cybersecurity industry is…
Menu
Explore
Curator's Pick
Trade
Trade STEM