···
Sign in
···
···
cybersecurity
hashtag
679.13
About
Reviews
Updates
1
Followers
0
Experts
Experts
mrosenquist
325.80
· 1988
gorayii
44.72
· 1207
activistpost
28.68
· 3318
hacktax
23.52
· 5
culgin
15.12
· 1580
Show more authors
Posts
Threads
mrosenquist
2.1 K
6 days ago
Hive.Blog
The Cyber Frenemy of the West: Understanding China
China is one of the most aggressive nation states when it comes to cybersecurity. They possess a renown global proficiency in attacking d...
mrosenquist
2.1 K
8 days ago
Hive.Blog
Microsoft's Recall Feature: Another Systemic Cybersecurity Failure
Microsoft has stumbled yet again. Its Recall feature — intended to enhance user experience by periodically capturing screenshots — has be...
mrosenquist
2.1 K
13 days ago
Hive.Blog
Time of Reckoning – Reviewing My 2024 Cybersecurity Predictions
The brutal reality is that cybersecurity predictions are only as valuable as their accuracy. As 2024 comes to a close, I revisit my forec...
mrosenquist
2.1 K
17 days ago
Hive.Blog
Importance of Soft Skills in Cybersecurity
The Cybersecurity Vault - episode 38, with guest Evgeniy Kharam. Soft Skills are essential cybersecurity as they enable communication, te...
overclocked
5.83
19 days ago
My Microsoft Account Version 2
Good Morning Out There ☀️. Well I thought I would put up a post the second time about The Creepy realitys of Personal Security, Here is t...
mrosenquist
2.1 K
20 days ago
Hive.Blog
What You Need to Know About Cybersecurity and AI
I had a great time chatting with the amazing Shira Rubinoff and Rinki Sethi on the Clarity podcast, discussing what people need to know a...
waivio_kisankumar
0.01
21 days ago
Waivio
Military Cybersecurity Market: Proactive Defense Solutions to Tackle Sophisticated Attacks
The military cybersecurity market has emerged as a critical component of defense strategies worldwide. With technological advancements a...
mrosenquist
2.1 K
28 days ago
Hive.Blog
The Dark Side of Microsoft’s New Voice Cloning Feature: Innovation Enabling Risk
Microsoft will release a new Teams feature that allows users to clone their voice so the system can translate their conversation into dif...
zeedbuy
0.23
29 days ago
PeakD
Microsoft's Passwordless Future: Transforming Digital Security
Microsoft’s Passwordless Revolution: A Game-Changer in Digital Security One of the most discussed topics in the U.S. technology space is...
mrosenquist
2.1 K
29 days ago
Hive.Blog
Hackers Impact Coffee Supply Chain Becomes National News
What does it say about our industry when a cybersecurity compromise that, in a software supply-chain vendor creates a minor inconvenience...
mrosenquist
2.1 K
last month
Hive.Blog
Is Cyber Threat Intelligence Worthless?
I was recently asked “What do intelligence reports do? They appear worthless!” I found the question both funny and ironic. Unfortunately,...
waivio_robert-haas
0.04
last month
Waivio
Advanced Metering Infrastructure (AMI) Market Expected to Reach USD 57.9 Billion by 2030, Growing at a CAGR of 12.3% | IMR
Understanding the Advanced Metering Infrastructure (AMI) Market The is booming with innovations and widespread adoption across the glob...
mrosenquist
2.1 K
last month
Hive.Blog
2024 Top 50 Thought Leaders on Risk Management
Congrats to the Top 50 Global Thought Leaders and Influencers on Risk Management 2024! Thanks Thinkers360 for the recognition to myself a...
mrosenquist
2.1 K
last month
Hive.Blog
Fraudsters Abuse DocuSign API for Legit-Looking Invoices
I didn’t see much visibility on this DocuSign hack. This is a situation where the product features were not vetted to understand if they ...
mrosenquist
2.1 K
last month
Hive.Blog
Joining The Cyber Express Advisory Board
I’m thrilled to join the incredible team at The Cyber Express as a member of their Editorial Advisory Board! It’s an honor to collaborate...
tdvtv
3.2 K
2 months ago
SSH IP Spoofing Attack on Tor
by DoingFedTime on DoingFedTime View my bio on Vigilante.TV: https://vigilante.tv/c/doingfedtime In October, a coordinated IP spoofing a...
cointopsecret
0.28
2 months ago
PeakD
How to Secure Your Crypto Assets: Essential Tips and Tricks
Protect your crypto future! 🛡️🔐 Learn essential tips to secure your digital assets and stay ahead of cyber threats. #cryptocurrency #block...
mrosenquist
2.1 K
2 months ago
Hive.Blog
Perfect Vulnerability for CISO Ultra Reliable Systems
A “Perfect” 10 vulnerability score is not what users of Cisco Ultra-Reliable Wireless Backhaul (URWB) systems were expecting. The recentl...
mrosenquist
2.1 K
2 months ago
Hive.Blog
Highlights from the InCyber Montreal Forum
I had a tremendous time at the InCyber Montreal forum. The speakers, panels, fellow practitioners, and events were outstanding! I bumped ...
mrosenquist
2.1 K
2 months ago
Hive.Blog
Do CISOs Smile?
How often do CISOs smile? Not very often. The role is difficult, ambiguous, and chaotic. There are immense pressures and grandiose expect...
deraaa
3.4 K
2 months ago
Voyage of Discovery
https://img.inleo.io/DQmRi4cFrRR68tNJ4GFUcha5qhrM5zH4K2BGnb5FPb6mJ2J/image.png Imagined with Meta.ai (WhatsApp) Looking at the scroll, I ...
waivio_purvi-tuvar
0.00
2 months ago
Waivio
🚀 Web Application Security Best Practices 🚀
In today’s digital-first world, securing your web application is no longer optional—it's essential. Check out Creole Studios’ latest arti...
cryptoguy
51.42
2 months ago
Hong Kong 🇭🇰 implements stricter cybersecurity measures, banning WhatsApp, ...
... WeChat, and Google Drive on government work computers. #HongKong #Cybersecurity #DataPrivacy #GovernmentPolicy #Tech Posted via D....
mrosenquist
2.1 K
2 months ago
Hive.Blog
Malware Can Hide From Email Scanners in Virtual Hard Drives
This is an interesting tactic by cyber attackers — using virtual machine hard drive files to bypass email malware filters! Never underest...
mrosenquist
2.1 K
2 months ago
Hive.Blog
SEC is Not Accepting Half-Truths
The SEC has fined four major companies for materially misleading investors regarding cyberattacks. Tech in Trouble Regulatory actions hav...
depressedfuckup
3 K
2 months ago
Philosophies for cyber security
I’m not sure how long it’s been since I started using the internet, but it’s been quite a while. In this time, I’ve only fallen victim to...
mrosenquist
2.1 K
2 months ago
Hive.Blog
Are Leaders Ready to Break the Ransomware Cycle
It is good to see US government leaders realize that ransomware is a growing existential threat to our country, at the hands of our adver...
mrosenquist
2.1 K
2 months ago
Hive.Blog
The Latest Cybersecurity Vault Interviews
The most influential cybersecurity experts discuss adversaries, risks, cyber warfare, and supply chain outages on the Cybersecurity Insig...
mrosenquist
2.1 K
2 months ago
Hive.Blog
Rising Cyber Aggression from Nation States
There are big predators in our digital world. In recent keynotes I have been talking about the big 4 aggressive nation states and how the...
mrosenquist
2.1 K
2 months ago
Hive.Blog
Deconstructing Ransomware Series
Ransomware attacks are vicious, expensive, impactful, and becoming commonplace. So, let's take a look at what Ransomware is, how attack...
AI
Waivio AI Assistant
How can I help you today?
About Waivio
Proofread
Translate