@M.Rosenquist activity
1 week ago: published the article
Task Force Gives Terrible Advice About Ransomware
1 week ago: published the article
Guardians of Academia - Battling Cyber Threats in Higher Education
4 weeks ago: published the article
Facebook Hacked Users Phones to Snoop on Encrypted Data
1 month ago: published the article
Researchers Give Birth to the First GenAI Worm
1 month ago: published the article
Best Practices in Securing 3rd Party Supply-Chain with Cassie Crossley
2 months ago: commented on the article "Keynote: Critical Infrastructures Are Under Attack..."
Almost all of the top 50 economic nations have a dedicated cyber capability, but very few are targeting Critical Infrastructures to specifically impact civilians.
2 months ago: published the article
Keynote: Critical Infrastructures Are Under Attack From Aggressive Nation States
2 months ago: published the article
Cybersecurity Panel at CLEA
2 months ago: published the article
Incident Materiality and Meeting New SEC Requirements with Malcolm Harkins
2 months ago: published the article
Creating A Sustainable Cybersecurity Industry
2 months ago: published the article
Online Information Session: MS Cybersecurity at Dominican University of Californ...
3 months ago: published the article
Career Advice to Cybersecurity Students – Replay of Live Presentation
3 months ago: published the article
The Unseen Threats: Anticipating Cybersecurity Risks in 2024
3 months ago: published the article
Embracing Innovation and Managing Cyber Risks
3 months ago: published the article
Tech Education Series #9: Are There Cybersecurity Roles That Leverage AI Skills
3 months ago: published the article
Carta's Reputation Crisis: How they can Rebuild Trust
3 months ago: published the article
Most advanced hack ever and why you should be concerned
3 months ago: published the article
5 Biggest Mistakes of Cybersecurity Programs
3 months ago: published the article
Tech Education Series #8: What Character or Behavioral Skills are Not Adequately...
3 months ago: published the article
The Cybersecurity Vault - Now is the Time to Improve Cybersecurity Metrics
3 months ago: commented on the article "Medical Emergency Assistance - Thank You"
Thanks! Yes, it does take some personal time, but it is worth it.
4 months ago: published the article
An In-Depth Look at the Evolution and Future of Cybersecurity
4 months ago: published the article
Medical Emergency Assistance - Thank You
4 months ago: published the article
Law Enforcement ALPHV Ransomware Takedown
4 months ago: published the article
Tech Education Series #7: How can I Break Into My First Cybersecurity Role?
4 months ago: published the article
SEC Case Against SolarWinds – Has the SEC Gone Too Far?
4 months ago: published the article
SEC Cybersecurity Disclosure Rules Take Effect
4 months ago: published the article
Career Advice for the IEU Cybersecurity Club
4 months ago: published the article
Cybersecurity Value - Embrace the Suck
4 months ago: published the article
TechEd Series #6: Is a Degree Necessary for a Career in Cybersecurity?
4 months ago: published the article
My Passion for Overcoming the Losing Proposition of Cybersecurity
4 months ago: published the article
TechEd Series #5: What Sites and Activities Should I Pursue to Build a Personal...
4 months ago: published the article
IEU Cyber Security Club Workforce Webinar
4 months ago: published the article
2024 Cyber Proud Launch-Networking Event
4 months ago: published the article
SEC Case Against SolarWinds Overview - The Rant You Have Been Waiting For
4 months ago: published the article
Joining Forces with London Speaker Bureau: Exploring Cybersecurity's Frontiers
4 months ago: published the article
Debating CISO Accountability: Inside the SolarWinds SEC Case
4 months ago: published the article
TechEd Series #4: What Can I be Doing Now as a Student to Help My Career?
5 months ago: published the article
Cybersecurity Insurance is Missing the Risk
5 months ago: published the article
TechEd Series #3 - Lessons You’ve Learned to Become Successful in Computer Scien...
5 months ago: published the article
Top 50 Global Thought Leaders and Influencers on Cybersecurity 2023
5 months ago: published the article
TechEd Series - What Was the Most Important Lesson You Learned in College?
5 months ago: published the article
New Tech Education Series Answers Career Building Questions
5 months ago: published the article
Caesars Bungling Notice of Data Breach
5 months ago: published the article
Debating the SEC Charges Against SolarWinds CISO
5 months ago: published the article
Cybersecurity Disruptions in Manufacturing Can Be Unusual
5 months ago: published the article
Lacking Practicality - Executive Order for Safe, Secure, and Trustworthy AI
5 months ago: published the article
The Cybersecurity Insights Podcast - Hosted By Matthew Rosenquist
6 months ago: published the article
Striking the Balance: Effective Cybersecurity Visualization for Informed Decisio...
6 months ago: published the article
The Top 25 Leaders in Cyber Security 2024
6 months ago: published the article
Cybersecurity Regulations Will Force Companies to be Trustworthy
6 months ago: published the article
Why I'm in Favor of the EU Cyber Resilience Act and You Should Be Too
6 months ago: published the article
Smart Cities Talk About Cybersecurity
6 months ago: published the article
Initiative is the Key to Success
6 months ago: published the article
Breaking into Cybersecurity can be Frustrating
7 months ago: gave thumbs up to the article
What Does Immutable Mean?
7 months ago: published the article
Speaking at the Horizon Cybersecurity Conference
8 months ago: published the article
Cybersecurity is Approaching a Crisis
8 months ago: published the article
New SEC Rules Mandate Cybersecurity Transparency and Oversight
9 months ago: published the article
National Cybersecurity Plan Fails to Address Ransomware
9 months ago: published the article
Delayed Reporting of HCA Healthcare Data Breach
9 months ago: published the article
Cybersecurity Meetup – 2023 Cybersecurity Predictions
9 months ago: published the article
Applying a Cybersecurity Threat Agent Risk Assessment to Healthcare
9 months ago: published the article
Password Reset Exposes Everyone’s Account
10 months ago: published the article
AI and Cybersecurity
10 months ago: published the article
Cybersecurity Vault Podcast - A Deep Dive into Cyber Risk with Wade Baker
10 months ago: published the article
Barracuda Email Security Gateway Customers at Risk and Must Act Immediately!
10 months ago: published the article
Cybersecurity Aspires to Be a Competitive Advantage
11 months ago: published the article
The Cybersecurity Vault - Cybersecurity Efficiency & Maximizing Value with Roger...
11 months ago: published the article
Cybersecurity Organizations: Transforming for Competitive Advantage
11 months ago: commented on the article "How Nation-State Cyber Attacks are Evolving"
Agreed! We must be careful as we move forward.
11 months ago: commented on the article "Are Cybersecurity Labels on IoT Devices a Wasted E..."
Security is slowly becoming a purchase criteria, which is progress. Labels are problematic in several ways, but may help overall by raising the awareness and reinforcing security competitiveness amon...
11 months ago: published the article
How Nation-State Cyber Attacks are Evolving
11 months ago: published the article
Top Cybersecurity Influencers in 2023
1 year ago: gave thumbs up to the article
How to Stake a Cryptocurrency (Complete Guide)
1 year ago: published the article
Impact of Cyber Threats to the Global Entrepreneurship Ecosystem
1 year ago: published the article
What is Perfect Cybersecurity?
1 year ago: published the article
Will Cyber PMCs Rise in 2023?
1 year ago: published the article
What is Going On with LastPass?
1 year ago: published the article
Cyber Insurance Needs to Grow Up
1 year ago: published the article
Quantum Encryption Replacement Algorithm Hacked by AI
1 year ago: published the article
Recognizing Cybersecurity WINS for 2022
1 year ago: published the article
Ransomware and the Ransom Problem
1 year ago: published the article
2023 Cybersecurity Predictions
1 year ago: published the article
CISO Role is Becoming More Complicated
1 year ago: published the article
Fragile Critical Infrastructure Needs Protection
1 year ago: published the article
Cyber Attacks Are Increasing Against Critical Infrastructure
1 year ago: published the article
ZeroTrust Community Virtual Summit Keynote is Available
1 year ago: published the article
Nation States are Shifting the Cybersecurity Landscape
1 year ago: commented on the article "5 Biggest Mistakes of Cybersecurity Programs - Onl..."
Yes! Happy to be on your podcast. Send me a DM in LinkedIn to setup a day/time (I am in Pacific Time zone)
1 year ago: published the article
5 Biggest Mistakes of Cybersecurity Programs - Online Class
1 year ago: published the article
Six Scenarios How Russia May Use Nukes in the war against Ukraine
1 year ago: published the article
5 Biggest Mistakes of Cybersecurity Programs
1 year ago: published the article
The Rise of Chief Trust and Security Officers
1 year ago: published the article
Zero Trust Community virtual conference is coming Dec 15th
1 year ago: published the article
New Cybersecurity Class On LinkedIn Learning Is Coming!
1 year ago: published the article
Is Russia Testing the Waters in Cyberattacks Against the US
1 year ago: commented on the article "Painful Lessons from Uber’s Recent Breach"
Yes, I post to both YouTube and Odysee
1 year ago: published the article
Painful Lessons from Uber’s Recent Breach
1 year ago: published the article
Russian Failures in Ukraine Raise the Global Cyber Risks
1 year ago: published the article
Painful Lessons from Uber’s Recent Über-Breach
1 year ago: published the article
Whistleblower Testifies to Congress about Twitter Security Flaws
1 year ago: published the article
Ukraine Counteroffensive Success Will Spur More Cyberattacks From Russia
1 year ago: published the article
Cyber Security Sauna podcast - Matthew Rosenquist on why value is the cybersecur...
1 year ago: published the article
Albania Expels Iranian Diplomats Over Cyber Attack
1 year ago: published the article
HexCon22 – Two Cybersecurity Value Aspects You Are Missing
1 year ago: published the article
Lloyd’s New Cyber Insurance Exclusions Aim to Avoid Payouts from Nation State Ha...
1 year ago: published the article
3 Tips to Maximize Cybersecurity Value
1 year ago: published the article
Cybersecurity Vault #9 with Min Kyriannis - Dangers of Misinformation
1 year ago: published the article
Featured in Global Leaders Today Magazine
1 year ago: published the article
Biggest Challenge in Cybersecurity
1 year ago: published the article
Cybersecurity Costs Skyrocket 60%
1 year ago: published the article
Value is the Cybersecurity Blind Spot - Speaking at the SPHERE22 Conference
1 year ago: published the article
US Sanctions Blender.io for Supporting Terror
1 year ago: commented on the article "Ransomware is Funding Russian Aggression"
In the case of Ransomware, undermining the motivation of the attackers. If they know they won't get paid for ransomware attacks, financially motivated aggressors will choose other methods of attack (...
1 year ago: published the article
Ransomware is Funding Russian Aggression
1 year ago: published the article
How Cybersecurity Risks Must Be Fixed to Build Trust in Technology Innovation
1 year ago: published the article
Strategic Cybersecurity Capability Process
2 years ago: commented on the article "Privacy Concerns for Dual-Use AI Image Clarity Too..."
Not sure, I didn't run the code myself.
2 years ago: gave thumbs up to the article
Make Brave Your Default Web Browser
2 years ago: published the article
Happy International Privacy Day
2 years ago: commented on the article "Video – Announcing 2022 Cybersecurity Predictions"
Completely agree. We want the benefits of digital innovation but should also respect that it is accompanied by equitable risks which must be purposefully managed.
2 years ago: published the article
Video Interview - Taxonomy of Cybersecurity Roles & Responsibilities with Deidre...
2 years ago: published the article
Vlog - Why is Norton adding a cryptocurrency miner to their product and should w...
2 years ago: published the article
Video – Announcing 2022 Cybersecurity Predictions
2 years ago: published the article
Illicit Crypto Transaction Percentages are at an All Time Low
2 years ago: published the article
Cybersecurity Insights Video - Criminalizing Ransomware Payments with Malcolm Ha...
2 years ago: gave thumbs up to the article
December Report - Total Rewards: 2.48 BCH !!!
2 years ago: gave thumbs up to the article
2022 The Year of Bitcoin Cash
2 years ago: commented on the article "8 Influential And Important Read Cash Users Of the..."
Very nice list! A wide range of influencers gives the platform a great depth.
2 years ago: gave thumbs up to the article
8 Influential And Important Read Cash Users Of the Year 2021.
2 years ago: published the article
Cybersecurity Insights Video: Deficient Forethought of Digital Technology Risks...
2 years ago: published the article
Cybersecurity Insights video interview - Growing Cyber Risks of Firmware with Sc...
2 years ago: commented on the article "Top 222 Influencers for 2022"
Thanks! Passwords (user credentials in general) is an interesting topic. The history, current usage, and how they will change in the future is a great area to study.
2 years ago: published the article
Top 222 Influencers for 2022
2 years ago: commented on the article "Suggested Reading 13"
Great list of reading!
2 years ago: gave thumbs up to the article
Suggested Reading 13
2 years ago: published the article
Privacy Concerns for Dual-Use AI Image Clarity Tools
2 years ago: commented on the article "Upcoming Webinar on Supply Chain Crisis – The Cybe..."
Chuck and I always have great discussions and this is such a relevant topic. Will be fun and informative.
2 years ago: published the article
Upcoming Webinar on Supply Chain Crisis – The Cyber Side
2 years ago: published the article
Thinkers360 Cybersecurity Predictions for 2022
2 years ago: commented on the article "Video Presentation: Why Cybersecurity is Not Fixed..."
Thanks for the compliment!
2 years ago: published the article
Video Presentation: Why Cybersecurity is Not Fixed Yet
2 years ago: published the article
The Problem of Banning Offensive Technology Sales
2 years ago: published the article
They Said a CISO Does What?
2 years ago: gave thumbs up to the article
5 Weird Things That Have Been 3-D Printed
2 years ago: gave thumbs up to the article
Don't panic!!! India may not be banning most cryptos
2 years ago: published the article
New Ransomware Bill Shows Promise But is Undermined by a Limited Scope
2 years ago: commented on the article "New Ransomware Bill Only Benefits Traditional Fina..."
It becomes part of a regulation which then governs the business practice of organizations. Those are the ones paying the huge ransoms (tens of millions per ransom sometimes). The control structure i...
2 years ago: published the article
New Ransomware Bill Only Benefits Traditional Financial Institutions
2 years ago: published the article
Miami To Distribute Digital Wallets And Pay MiamiCoin Dividends In Bitcoin
2 years ago: published the article
Video Interview: Winning Hearts and Minds for Security with Naomi Buckwalter
2 years ago: published the article
Video Replay - Closing the Cyber Skills Gap Panel Discussion
2 years ago: published the article
EU Mandates Cybersecurity For Phones And Wireless Devices
2 years ago: published the article
Video - Cybersecurity Value and Metrics with Gavin Grounds
2 years ago: gave thumbs up to the article
Suggested Reading 7
2 years ago: commented on the article "International Coalition Fails to Address Ransomwar..."
The attackers are smart and constantly evolving! Have you looked at the NoMoreRansom.org site? It has many decryptors for older versions of ransomware. It does not work on all variants, but it is a...
2 years ago: published the article
International Coalition Fails to Address Ransomware
2 years ago: published the article
The Next Big Data Breach You Need to Know About
2 years ago: commented on the article "Are Cybersecurity Labels on IoT Devices a Wasted E..."
I think that is one of the major challenges. How does a label convey the risks and consequences to general consumers, in a way they are better armed to make informed purchase decisions? Cybersecurit...
2 years ago: published the article
Are Cybersecurity Labels on IoT Devices a Wasted Effort
2 years ago: published the article
Why Trust in Digital Tech is the Key to Future Innovation - Hexcon21 Session by...
2 years ago: published the article
ATMIA 2021 ATM Security Conference
2 years ago: published the article
2021 Cybersecurity Symposium for Smart Cities Virtual Conference
2 years ago: published the article
Hiring Desperation May Create Cybersecurity Risks
2 years ago: published the article
4 Phases of Cybersecurity Maturity
2 years ago: published the article
Cybersecurity Progresses from Mitigating Risks to Deliver Profit Opportunities
2 years ago: published the article
The Cybersecurity Vault - Rohit Parchuri on the Challenges of Securing Future He...
2 years ago: published the article
The Cybersecurity Vault - The Silent War on Digital Privacy with Andy Brown
2 years ago: published the article
Anti-Money Laundering Detection Tool on the Dark Web
2 years ago: published the article
600 Million Differences Between Hackers and Cybercriminals
2 years ago: published the article
Top Tip for New Managers
2 years ago: published the article
Arguments Against Criminalizing Ransomware Payments
2 years ago: commented on the article "Phone Scammer Aborted - Beware!"
It will take everyone to work together!
2 years ago: published the article
Demotivating Ransomware Attackers by Ending Ransom Payments
2 years ago: commented on the article "Phone Scammer Aborted - Beware!"
Scams are increasing and social engineering is the primary path. Great job in being aware, cautious, and avoiding this scam! Well done.
2 years ago: gave thumbs up to the article
Best Add-Ons For Firefox: Cryptocurrency Edition
2 years ago: commented on the article "This is How to End Ransomware"
I too really dislike the path of regulation... But I do recognize that when the natural forces that should drive organizations to align to consumer benefits is not working, regulation is needed. Pri...
2 years ago: published the article
This is How to End Ransomware
2 years ago: published the article
Why REvil Ransomware Group Suddenly Disappeared
2 years ago: published the article
Ransomware Explained - Ending Ransomware
2 years ago: published the article
Ransomware Explained - 3 Fundamental Ways to Stop Cyberattacks
2 years ago: published the article
Joining the United Cybersecurity Alliance advisory board
2 years ago: published the article
Ransomware Cybersecurity Fireside Chat
2 years ago: published the article
Ransomware Explained - Understanding the Attackers
2 years ago: published the article
Ransomware Explained - Increasing Costs and Impact
2 years ago: published the article
Ransomware Explained Video Series
2 years ago: gave thumbs up to the article
Failure and success of cryptocurrencies
2 years ago: published the article
2 Biggest Factors Driving the Future of Cybersecurity
2 years ago: published the article
Paying Ransomware Should be Illegal
2 years ago: published the article
The Colonial Pipeline Cyberattack Might be Good for America
2 years ago: published the article
Top 10 Things the Industry Can Do Now to Mitigate Digital Supply-Chain Attacks!
2 years ago: gave thumbs up to the article
Police removes Emotet malware from 1 million infected PCs worldwide
2 years ago: gave thumbs up to the article
QNAP updates its anti-malware tool to remove Qlocker ransomware
2 years ago: gave thumbs up to the article
Bitcoin Scams and how to avoid them
2 years ago: published the article
Where Should a CISO Report Into?
2 years ago: published the article
Reevaluating the Work-Life Balance
3 years ago: published the article
What’s Broken with M&A Cybersecurity
3 years ago: published the article
Cybersecurity is Not Reaching its Full Potential
3 years ago: published the article
We Must Crush Digital Misinformation Before It Destroys Society
3 years ago: published the article
Good and Bad of Google’s Project Zero Vulnerability Disclosure Changes
3 years ago: gave thumbs up to the article
How your account might randomly get sold
3 years ago: gave thumbs up to the article
Staying safe as you go about your daily online social activities
3 years ago: published the article
Zoom Critical Vulnerability Discovered
3 years ago: commented on the article "Stopping the Runaway Ransomware Epidemic"
Thanks. Correcting the typo!
3 years ago: published the article
Stopping the Runaway Ransomware Epidemic
3 years ago: published the article
How Nation States are Reshaping the Cybersecurity Landscape
3 years ago: published the article
Chaining Exploits are Taking Vulnerabilities to a New Level
3 years ago: published the article
A Simple Solution to Crush Digital Misinformation
3 years ago: published the article
DeepFakes – the Digital Future of Forgery
3 years ago: published the article
Concerns of a New Digital Cold War
3 years ago: published the article
Cyber Threats Porting Malware to Apple Chips
3 years ago: published the article
What SMB's need to know about Cybersecurity
3 years ago: published the article
Who do Executives Blame for Cybersecurity Failures?
3 years ago: published the article
Good Data Morning Show – LIVE!
3 years ago: gave thumbs up to the article
Bitcoin Cash awareness Africa graphics [North Africa, East Africa designs]
3 years ago: published the article
Nation State Cybercriminals Are A Risk To Everyone
3 years ago: published the article
Speaking at the HMG Atlanta Virtual CIO Summit
3 years ago: published the article
CyberPro Podcast - Focus of Cybersecurity is to Manage Digital Risk – Matthew Ro...
3 years ago: published the article
Ally of the Year Awards 2021
3 years ago: published the article
Not Paying Ransomware is the Only Way We All Win
3 years ago: published the article
HMG CISO Executive Leadership Summit
3 years ago: published the article
Building Smart Cities of the Future Takes a Team of Experts
3 years ago: published the article
Discussing the power of AI in security
3 years ago: published the article
More Supply-Chain Cyberattacks are in the Wind
3 years ago: published the article
Rise in Whistleblowing Signals the Need for Formal CyberEthics
3 years ago: published the article
If I Were a Nation-State Hacker Looking to Conduct Supply Chain Attacks
3 years ago: published the article
Safety Risks Rise Due to Critical Infrastructure Cyber Attacks
3 years ago: published the article
Apple’s CEO Superbly Articulates How Privacy Need Not be Sacrificed for Technolo...
3 years ago: published the article
Top 3 Missions of a CISO
3 years ago: published the article
Another Creepy Case of Hackers Watching People in their Homes
3 years ago: published the article
Falsely Vilifying Cryptocurrency in the Name of Cybersecurity
3 years ago: published the article
Disrupted but Not Dead – Law Enforcement Scores a Big Win Against EMOTET Botnet
3 years ago: published the article
U.S. the 4th Worst Privacy Offender for Government Collection of Biometric Data
3 years ago: published the article
Cautious Optimism and Grave Concerns as Intel Integrates Cybereason into Chips
3 years ago: published the article
New U.S. Cybersecurity Leadership Needs More Experience Diversity
3 years ago: published the article
Finding the Next SolarWinds Type of Supply Chain Attack
3 years ago: published the article
Latest Privacy Controversy Shows WhatsApp Must be Transparent
3 years ago: published the article
WhatsApp Still Needs to Prove it is Trustworthy
3 years ago: published the article
Cybersecurity Value is About Protecting Intangible Assets
3 years ago: published the article
Why are Cybersecurity Roles Confusing
3 years ago: gave thumbs up to the article
Signal App
3 years ago: gave thumbs up to the article
Ledger users hacked: beware of phishing!
3 years ago: published the article
Law Enforcement is Seduced by Big Cybercrime Cases
3 years ago: published the article
Top 2020 Cybersecurity Lessons for Cryptocurrency
3 years ago: published the article
The new year starts off strong for Bitcoin
3 years ago: published the article
Privacy is at risk when security fails - especially for surveillance cameras
3 years ago: published the article
Update to Altilly Cryptocurrency Exchange Hack
3 years ago: published the article
Altilly Cryptocurrency Exchange is Hacked
3 years ago: gave thumbs up to the article
Greatest hacks in history
3 years ago: published the article
The CISO Dilemma - When Leadership Ignores Risks
3 years ago: published the article
Objectives of Nation State Cyber Attackers
3 years ago: published the article
Leaders and Losers of the SolarWinds Hack
3 years ago: published the article
Missing the Big Picture from the SolarWinds Hack
3 years ago: published the article
Evolution of Law Enforcement is Driving Changes Cryptocurrency
3 years ago: gave thumbs up to the article
Fundme.Cash flipstarter campaign need your support
3 years ago: published the article
Top 10 Privacy Thought Leaders and Influencers
3 years ago: published the article
FireEye Hacked – A Stark Reminder of Cybersecurity Risks
3 years ago: published the article
Apple App Store Will Require Privacy Transparency
3 years ago: published the article
Why TrickBot Malware may be a Game Changer for Cybersecurity
3 years ago: published the article
Some Justice for Phone Scammers
3 years ago: published the article
Top 3 Recommendations to Avoid Online Holiday Fraud and Scams
3 years ago: published the article
China Seizes $4B in Cryptocurrency from Scammers
3 years ago: gave thumbs up to the article
Ways to strengthen your password
3 years ago: published the article
Disable Amazon Sidewalk for Now
3 years ago: published the article
Cybersecurity: Opportunity or Threat – A fireside chat
3 years ago: published the article
Managing IoT Data Security Risks
3 years ago: gave thumbs up to the article
GoDaddy allowed popular crypto domains takeover
3 years ago: published the article
Intel in Denial of the Latest SGX Secure Enclave Vulnerability
3 years ago: published the article
Future of Offensive Attack Simulation: Strategies, Tools & Techniques
3 years ago: published the article
Police Cameras are Providing Facial Recognition Tracking to Criminals in Moscow
3 years ago: published the article
New Zealand Simplifies Privacy with a Data-Breach Determination Tool
3 years ago: published the article
Inaccurate Predictions about Cybersecurity is Dangerous
3 years ago: published the article
Deloitte's 'Test your Hacker IQ' Proves Vulnerable to being Hacked
3 years ago: published the article
U.S. Dept of Justice seizes $1 billion in Bitcoin
3 years ago: published the article
Watch the recorded webinar "The Role of Cyber Culture in a Cyber Strategy"
3 years ago: commented on the article "Is Paying Ransomware Now Illegal?"
Just industry advice to put proper security and recovery measures in place before something bad hits.
3 years ago: published the article
Intel’s Secret Key to Decrypt Microcode Patches is Exposed
3 years ago: published the article
Bahamas new digital currency will be the next testbed for innovative cybercrime...
3 years ago: published the article
California Privacy Rules Updated to Target Shady Practices
3 years ago: published the article
Upcoming Cybersecurity Speaking Events
3 years ago: gave thumbs up to the article
What is 51% attack??
3 years ago: published the article
Cybersecurity Awareness Month – Accept My Challenge
3 years ago: commented on the article "The NSA knows something you don't"
I just type what I think.
3 years ago: published the article
The NSA knows something you don't
3 years ago: published the article
Cybersecurity & IoT Showcase 2020 conference
3 years ago: published the article
Charges Against Russian Nation-State Hackers Sends a Message
3 years ago: published the article
Cyber Threats Enhance Phishing with AI and Worm Functions for Rapid Disruption
3 years ago: published the article
Apple T2 Chip Vulnerability Challenges the Industry
3 years ago: published the article
Is Paying Ransomware Now Illegal?
3 years ago: published the article
Microsoft's New Tactics Disrupts Trickbot Ransomware
3 years ago: published the article
Should Governments be Responsible for Protecting the Internet?
3 years ago: published the article
SUTL Cybersecurity and IOT free virtual conference
3 years ago: published the article
Leveraging culture for better cybersecurity?