Home page
Communities
Stats
About read.cash
Register
Login
Open register popup
read.cash
Topics
Life
Cryptocurrency
Blog
Writing
Experiences
Story
Blogging
Crypto
Bitcoin Cash
Thoughts
Blockchain
Money
BCH
Experience
Personal
Cryptocurrencies
read.cash
Bitcoin
Freewrite
Finance
Reality
Motivation
Love
Investment
Personal Thoughts
Journey
Family
Random
Travel
Food
...All topics...
Communities
Login
Get Started
Cybersecurity and Privacy (e3e6)
285
Cybersecurity, privacy, and digital trust
Join the community
Moderators
@M.Rosenquist
·
1 week ago
The Rise and Risks of Shadow AI
Shadow AI, the internal use of AI tools and services without the enterprise oversight teams expressly knowing about it (ex. IT, legal, cybersecurity , compliance, and privacy teams, just to name a...
2 likes
·
3
comments
@M.Rosenquist
·
1 week ago
New Cryptojacking Malware Breakdown
New Cryptojacking Malware Breakdown - The GhostEngine cryptocurrency mining malware disables endpoint security protections, deletes logs, modifies the kernel, and digs-in to establish persistence....
1 likes
·
0
comments
@M.Rosenquist
·
1 week ago
North Korea is Trying to Embed Agents into IT Positions of Western Countries
Attention IT departments, the FBI is warning US companies to be wary of inadvertently hiring North Koreans to remotely work in their IT departments, amid fears of data theft and hacking. We are seei...
1 likes
·
0
comments
@M.Rosenquist
·
1 week ago
Free Cybersecurity Specialist Workshop
A free workshop for students looking to become Cybersecurity Specialists! Also, if you are already a professional and want to explore a career shift to #cybersecurity, check out the live session ho...
1 likes
·
0
comments
@M.Rosenquist
·
1 week ago
SEC Will Require Finance to Notify Breach Victims in 30 Days
More SEC rules, this time mandating financial firms inform victims of data breaches within 30 days! Why wasn't this already a requirement? Last year, the SEC instituted requirements for publicly tr...
1 likes
·
0
comments
@M.Rosenquist
·
2 weeks ago
And Security for All Podcast2024: Cybersecurity's Major Trends & Threat Dynamics
I'm excited to be speaking live with Kim Hakim on the And Security For All podcast tomorrow to discuss 2024's Cybersecurity's Major Trends & Threat Dynamics, including the ever-changing role of a CIS...
1 likes
·
0
comments
@M.Rosenquist
·
2 weeks ago
Unlock Your Cybersecurity Career - Exclusive Discounts on Top Training
There are tremendous opportunities in cybersecurity and the industry needs many more qualified workers. Training plays an important part. That is why I am partnering with Infosec4TC , an online tr...
1 likes
·
0
comments
@M.Rosenquist
·
4 weeks ago
Unlocking SMB Cybersecurity: The Rise of Virtual CISOs in 2024 and Beyond
This year, virtual CISOs must begin making a difference in our industry. For the longest time, small and medium businesses (SMBs) have been abandoned by the cybersecurity industry. But, SMBs need sec...
2 likes
·
0
comments
@M.Rosenquist
·
1 month ago
Task Force Gives Terrible Advice About Ransomware
? I couldn’t help myself, I had to rant about this! A ‘security research’ group is recommending against banning ransomware payments, which would eradicate these attacks from occurring, and instead wan...
1 likes
·
0
comments
@M.Rosenquist
·
1 month ago
Guardians of Academia - Battling Cyber Threats in Higher Education
? Donna Kidwell, CISO of Arizona State University, is one of the best and brightest in our community! I am continually amazed at her insights, strategic focus, and ability to creatively tackle some of...
1 likes
·
0
comments
@M.Rosenquist
·
2 months ago
Facebook Hacked Users Phones to Snoop on Encrypted Data
Media is reporting that documents emerging from a legal case are revealing that in 2016 Facebook created a project to intercept and decrypt traffic on user’s phones to gain a competitive advantage. ...
3 likes
·
0
comments
@MintDice
·
2 months ago
Ethereum Phishing Scams on the Rise: How to Protect Your Crypto
Scams in the cryptocurrency world are all too common, and an already bad problem grew worse in February. According to an article on Bitcoin.com , phishing scammers were able to siphon over $47 millio...
1 likes
·
2
comments
@M.Rosenquist
·
2 months ago
Researchers Give Birth to the First GenAI Worm
It was bound to happen — researchers have created a 1st generation AI worm that can steal data, propagate malware, and spread via email. Ben Nassi from Cornell Tech, Stav Cohen from the Israel Insti...
1 likes
·
0
comments
@M.Rosenquist
·
3 months ago
Best Practices in Securing 3rd Party Supply-Chain with Cassie Crossley
? The Cybersecurity Vault episode 28 Securing the software supply chain, including 3rd party vendors and suppliers, is a difficult problem that the cybersecurity industry is trying to tackle. The thr...
1 likes
·
0
comments
@MintDice
·
3 months ago
WARNING: New Crypto Scam on Telegram
As much as we love cryptocurrency, it is well-known that the crypto space is filled with scams. A new scam that recently popped up on our radar is worse than most, and we want to make sure everyone is...
5 likes
·
2
comments
@M.Rosenquist
·
3 months ago
Keynote: Critical Infrastructures Are Under Attack From Aggressive Nation States
? Critical Infrastructures are under attack from aggressive nation states! Governments must step forward to help protect these crucial sectors and the services they provide to citizens. My cybersecur...
1 likes
·
2
comments
@M.Rosenquist
·
3 months ago
Cybersecurity Panel at CLEA
I had a great time speaking today at the CIO/CISO Executive Leadership Alliance (CLEA) meeting with Jesse Bociek and Rocco Grillo (these luminaries are so smart)! Excellent discussions regarding risk...
1 likes
·
0
comments
@M.Rosenquist
·
3 months ago
Incident Materiality and Meeting New SEC Requirements with Malcolm Harkins
? The new SEC requirements for public companies includes reporting within 4 days of determining that a cybersecurity incident is ‘material’ to the company. But what is materiality? In this episode, I...
2 likes
·
0
comments
@M.Rosenquist
·
3 months ago
Creating A Sustainable Cybersecurity Industry
? The cybersecurity industry is facing many sustainability challenges. I enjoyed a lengthy discussion with Terry Thompson at Top Cyber Pro to highlight the strategic problems and opportunities! Give...
2 likes
·
0
comments
@M.Rosenquist
·
3 months ago
Online Information Session: MS Cybersecurity at Dominican University of California
Dominican University of California offers a fully online, one-year, STEM-designated graduate cybersecurity program starting fall 2024. Join the next online information session with Joanna Grama, JD...
5 likes
·
1
comments
@M.Rosenquist
·
4 months ago
Career Advice to Cybersecurity Students – Replay of Live Presentation
? I was honored to speak at the recent Cyber Proud event to an audience of students and graduates who were seeking advice on pursuing a career in #cybersecurity. There is a chasm between entry level...
2 likes
·
1
comments
@M.Rosenquist
·
4 months ago
The Unseen Threats: Anticipating Cybersecurity Risks in 2024
Nation-state attacks will be the dominant influence on the capabilities, growth, and impacts seen across the cybersecurity industry in 2024. Years of investment, innovation, and willingness to conduc...
1 likes
·
1
comments
@Garage.Writer
·
4 months ago
Navigating the Evolution of the Internet of Things (IoT): A Cybersecurity and Privacy Odyssey
Welcome, readers, to a journey through the ever-evolving landscape of the Internet of Things (IoT). In today's fast-paced world, where connectivity is king, IoT has emerged as a transformative force....
1 likes
·
1
comments
@M.Rosenquist
·
4 months ago
Embracing Innovation and Managing Cyber Risks
? I had a great discussion with Julian, from eChannelNEWS where we discussed the pivotal role of information dissemination and the construction of a fortified cybersecurity ecosystem. Of particular im...
1 likes
·
0
comments
@M.Rosenquist
·
4 months ago
Tech Education Series #9: Are There Cybersecurity Roles That Leverage AI Skills
? Welcome to the Tech Education Series, where current students and life-long learners ask questions to industry professionals in search of meaningful insights. Check out all the questions and answer...
1 likes
·
0
comments
@M.Rosenquist
·
4 months ago
Carta's Reputation Crisis: How they can Rebuild Trust
? Carta has a full blown reputation crisis underway, but all is not lost, if the company acts in a meaningful and ethical way! In today’s video, I give my take on how they can recover and rebuild tr...
1 likes
·
0
comments
@M.Rosenquist
·
4 months ago
Most advanced hack ever and why you should be concerned
? One of the most impressive hacks ever! Such tremendous sophistication is the hallmark of Nation State level attackers. Truly epic, but should you be worried? Some say no, as the attack is not curr...
1 likes
·
0
comments
@M.Rosenquist
·
4 months ago
5 Biggest Mistakes of Cybersecurity Programs
Another year, another repeat of cybersecurity mistakes! To break the cycle and avoid them, we must learn to recognize the biggest issues that cybersecurity organizations are making. That is why I cr...
1 likes
·
0
comments
@Garage.Writer
·
4 months ago
Guardians of the Digital Vault: Navigating Cybersecurity and Privacy in Cryptocurrency
In the ever-evolving landscape of the digital age, where transactions transcend borders and financial landscapes reshape, the rise of cryptocurrency has been nothing short of revolutionary. As we embr...
1 likes
·
0
comments
@M.Rosenquist
·
4 months ago
Tech Education Series #8: What Character or Behavioral Skills are Not Adequately Being Taught
? Tech Education Series #8: What Character or Behavioral Skills are Not Adequately Being Taught Welcome to the Tech Education Series, where current students and life-long learners ask questions to i...
2 likes
·
0
comments