BlogHide Reblurtsmrosenquist in podcast • 6 months agoAnd Security for All Podcast 2024: Cybersecurity's Major Trends & Threat DynamicsI’m excited to be speaking live with Kim Hakim on the And Security For All podcast tomorrow to discuss 2024’s Cybersecurity’s Major Trends & Threat Dynamics, including the ever-changing role of a…mrosenquist in cybersecurity • 6 months agoUnlock Your Cybersecurity Career: Exclusive Discounts on Top Training Courses!There are tremendous opportunities in cybersecurity and the industry needs many more qualified workers. Training plays an important part. That is why I am partnering with Infosec4TC, an online…mrosenquist in artificial • last yearThe Danger of AII offer a slight twist: "I am worried about how AI will amplify the dangers of natural stupidity" AI is just a tool, a powerful tool. Put that into the hands of malicious individuals or those who…mrosenquist in technology • last yearCybersecurity is Approaching a CrisisCybersecurity has a growing problem that will force an evolution in the industry — it must deliver more recognizable value! Cybersecurity must re-envision itself to both protect and become an…mrosenquist in cybersecurity • last yearNew SEC Rules Mandate Cybersecurity Transparency and OversightThe new SEC Rules establish a framework that requires rapid disclosure of material cybersecurity incidents (4 days), companies will need to be able to explain their cybersecurity posture to manage…mrosenquist in cybersecurity • last yearNational Cybersecurity Plan Fails to Address RansomwareThe US National Cybersecurity Strategy Implementation Plan fails to address ransomware. There is a real opportunity for the government to make significant progress in crushing the growing scourge…mrosenquist in news • last yearDelayed Reporting of HCA Healthcare Data BreachThe recent HCA Healthcare data breach of 11 million patients’ data is shaping up to be another ugly incident where a company did not promptly communicate with its customers. HCA Healthcare is a…mrosenquist in cybersecurity • last yearCybersecurity Meetup – 2023 Cybersecurity PredictionsCheck the calendar as Richard Stiennon and I discuss the forward-looking cybersecurity predictions for 2023 and beyond! With several decades of knowledge and experience between us, we take a…mrosenquist in cybersecurity • last yearApplying a Cybersecurity Threat Agent Risk Assessment to HealthcareApplying a Cybersecurity Threat Agent Risk Assessment to Healthcaremrosenquist in news • last yearPassword Reset Exposes Everyone's AccountEver wonder what kinds of things happen when good-intentioned people try to manage cybersecurity? Well, in this case, a High School in Illinois responded to a system error by resetting every…mrosenquist in artificial • last yearAI and CybersecurityCybersecurity Meetup with Richard Stiennon and Matthew Rosenquistmrosenquist in technology • last yearCybersecurity Vault Podcast - A Deep Dive into Cyber Risk with Wade BakerCybersecurity Vault Podcast - Cyber Risk Metrics with Wade Bakermrosenquist in news • last yearBarracuda Email Security Gateway Customers at Risk and Must Act Immediately!Hackers are exploiting an un-patchable vulnerability (CVE-2023–2868) in Barracuda Email Security Gateway appliances. Barracuda has announced that customers should discontinue using the email…mrosenquist in cybersecurity • last yearCybersecurity Aspires to Be a Competitive AdvantageCybersecurity transformation to a competitive advantagemrosenquist in technology • 2 years agoThe Cybersecurity Vault - Cybersecurity Efficiency & Maximizing Value with Roger SelsIn this Cybersecurity Vault episode, I talk with Roger Sels about cybersecurity resource efficiency and maximizing value. Roger is a longtime cybersecurity executive and co-founder of a startup that…mrosenquist in technology • 2 years agoCybersecurity Organizations: Transforming for Competitive AdvantageThe cybersecurity game is changing. No longer is it limited to regulatory compliance or protection from possible attacks. With budget cuts that accompany economic downturns, CISOs are under pressure…mrosenquist in technology • 2 years agoHow Nation-State Cyber Attacks are EvolvingAggressive countries are leveraging cyber to conduct offensive operations against targets across the globe. The threat of nation-state attacks is growing and I had the opportunity to discuss the…mrosenquist in cybersecurity • 2 years agoTop Cybersecurity Influencers in 2023I greatly appreciate being included in the “Top Cyber Security Experts & Influencers to Follow in 2023” list from WhizLabs! This group of leaders is a driving force for cybersecurity education…mrosenquist in cybersecurity • 2 years agoCybersecurity and Privacy Are Needed for Trust – Podcast panel discussionCybersecurity and Privacy are both necessary for organizations to earn and maintain trust with their partners and customers. This lively discussion brings together privacy, cybersecurity, and…mrosenquist in cybersecurity • 2 years agoIs the MSI Hack an IT Supply Chain Attack?When I heard of the MSI compromise, I had similar fears of an IT supply chain attack. However, after walking the logic and high-level details I felt that the current attack was unlikely a…