Waivio

cybersecurity

hashtag
679.13

Experts

Show more authors

mrosenquist

2.1 K
Hive.Blog

The Cyber Frenemy of the West: Understanding China

China is one of the most aggressive nation states when it comes to cybersecurity. They possess a renown global proficiency in attacking d...

mrosenquist

2.1 K
Hive.Blog

Microsoft's Recall Feature: Another Systemic Cybersecurity Failure

Microsoft has stumbled yet again. Its Recall feature — intended to enhance user experience by periodically capturing screenshots — has be...

mrosenquist

2.1 K
Hive.Blog

Time of Reckoning – Reviewing My 2024 Cybersecurity Predictions

The brutal reality is that cybersecurity predictions are only as valuable as their accuracy. As 2024 comes to a close, I revisit my forec...

mrosenquist

2.1 K
Hive.Blog

Importance of Soft Skills in Cybersecurity

The Cybersecurity Vault - episode 38, with guest Evgeniy Kharam. Soft Skills are essential cybersecurity as they enable communication, te...

overclocked

5.83

My Microsoft Account Version 2

Good Morning Out There ☀️. Well I thought I would put up a post the second time about The Creepy realitys of Personal Security, Here is t...

mrosenquist

2.1 K
Hive.Blog

What You Need to Know About Cybersecurity and AI

I had a great time chatting with the amazing Shira Rubinoff and Rinki Sethi on the Clarity podcast, discussing what people need to know a...

waivio_kisankumar

0.01
Waivio

Military Cybersecurity Market: Proactive Defense Solutions to Tackle Sophisticated Attacks

The military cybersecurity market has emerged as a critical component of defense strategies worldwide. With technological advancements a...

mrosenquist

2.1 K
Hive.Blog

The Dark Side of Microsoft’s New Voice Cloning Feature: Innovation Enabling Risk

Microsoft will release a new Teams feature that allows users to clone their voice so the system can translate their conversation into dif...

zeedbuy

0.23
PeakD

Microsoft's Passwordless Future: Transforming Digital Security

Microsoft’s Passwordless Revolution: A Game-Changer in Digital Security One of the most discussed topics in the U.S. technology space is...

mrosenquist

2.1 K
Hive.Blog

Hackers Impact Coffee Supply Chain Becomes National News

What does it say about our industry when a cybersecurity compromise that, in a software supply-chain vendor creates a minor inconvenience...

mrosenquist

2.1 K
Hive.Blog

Is Cyber Threat Intelligence Worthless?

I was recently asked “What do intelligence reports do? They appear worthless!” I found the question both funny and ironic. Unfortunately,...

waivio_robert-haas

0.04
Waivio

Advanced Metering Infrastructure (AMI) Market Expected to Reach USD 57.9 Billion by 2030, Growing at a CAGR of 12.3% | IMR

Understanding the Advanced Metering Infrastructure (AMI) Market The is booming with innovations and widespread adoption across the glob...

mrosenquist

2.1 K
Hive.Blog

2024 Top 50 Thought Leaders on Risk Management

Congrats to the Top 50 Global Thought Leaders and Influencers on Risk Management 2024! Thanks Thinkers360 for the recognition to myself a...

mrosenquist

2.1 K
Hive.Blog

Fraudsters Abuse DocuSign API for Legit-Looking Invoices

I didn’t see much visibility on this DocuSign hack. This is a situation where the product features were not vetted to understand if they ...

mrosenquist

2.1 K
Hive.Blog

Joining The Cyber Express Advisory Board

I’m thrilled to join the incredible team at The Cyber Express as a member of their Editorial Advisory Board! It’s an honor to collaborate...

tdvtv

3.2 K

SSH IP Spoofing Attack on Tor

by DoingFedTime on DoingFedTime View my bio on Vigilante.TV: https://vigilante.tv/c/doingfedtime In October, a coordinated IP spoofing a...

cointopsecret

0.28
PeakD

How to Secure Your Crypto Assets: Essential Tips and Tricks

Protect your crypto future! 🛡️🔐 Learn essential tips to secure your digital assets and stay ahead of cyber threats. #cryptocurrency #block...

mrosenquist

2.1 K
Hive.Blog

Perfect Vulnerability for CISO Ultra Reliable Systems

A “Perfect” 10 vulnerability score is not what users of Cisco Ultra-Reliable Wireless Backhaul (URWB) systems were expecting. The recentl...

mrosenquist

2.1 K
Hive.Blog

Highlights from the InCyber Montreal Forum

I had a tremendous time at the InCyber Montreal forum. The speakers, panels, fellow practitioners, and events were outstanding! I bumped ...

mrosenquist

2.1 K
Hive.Blog

Do CISOs Smile?

How often do CISOs smile? Not very often. The role is difficult, ambiguous, and chaotic. There are immense pressures and grandiose expect...

deraaa

3.4 K

Voyage of Discovery

https://img.inleo.io/DQmRi4cFrRR68tNJ4GFUcha5qhrM5zH4K2BGnb5FPb6mJ2J/image.png Imagined with Meta.ai (WhatsApp) Looking at the scroll, I ...

waivio_purvi-tuvar

0.00
Waivio

🚀 Web Application Security Best Practices 🚀

In today’s digital-first world, securing your web application is no longer optional—it's essential. Check out Creole Studios’ latest arti...

cryptoguy

51.42

Hong Kong 🇭🇰 implements stricter cybersecurity measures, banning WhatsApp, ...

... WeChat, and Google Drive on government work computers. #HongKong #Cybersecurity #DataPrivacy #GovernmentPolicy #Tech Posted via D....

mrosenquist

2.1 K
Hive.Blog

Malware Can Hide From Email Scanners in Virtual Hard Drives

This is an interesting tactic by cyber attackers — using virtual machine hard drive files to bypass email malware filters! Never underest...

mrosenquist

2.1 K
Hive.Blog

SEC is Not Accepting Half-Truths

The SEC has fined four major companies for materially misleading investors regarding cyberattacks. Tech in Trouble Regulatory actions hav...

depressedfuckup

3 K

Philosophies for cyber security

I’m not sure how long it’s been since I started using the internet, but it’s been quite a while. In this time, I’ve only fallen victim to...

mrosenquist

2.1 K
Hive.Blog

Are Leaders Ready to Break the Ransomware Cycle

It is good to see US government leaders realize that ransomware is a growing existential threat to our country, at the hands of our adver...

mrosenquist

2.1 K
Hive.Blog

The Latest Cybersecurity Vault Interviews

The most influential cybersecurity experts discuss adversaries, risks, cyber warfare, and supply chain outages on the Cybersecurity Insig...

mrosenquist

2.1 K
Hive.Blog

Rising Cyber Aggression from Nation States

There are big predators in our digital world. In recent keynotes I have been talking about the big 4 aggressive nation states and how the...

mrosenquist

2.1 K
Hive.Blog

Deconstructing Ransomware Series

​ Ransomware attacks are vicious, expensive, impactful, and becoming commonplace. So, let's take a look at what Ransomware is, how attack...
AI
Waivio AI Assistant
How can I help you today?