Home page
Communities
Stats
About read.cash
Register
Login
Open register popup
read.cash
Topics
Life
Cryptocurrency
Blog
Writing
Experiences
Story
Blogging
Crypto
Bitcoin Cash
Thoughts
Blockchain
Money
BCH
Experience
Personal
Cryptocurrencies
Bitcoin
read.cash
Freewrite
Finance
Reality
Motivation
Love
Investment
Personal Thoughts
Journey
Family
Random
Travel
Food
...All topics...
Communities
Login
Get Started
Cybersecurity and Privacy (e3e6)
299
Cybersecurity, privacy, and digital trust
Join the community
Moderators
@M.Rosenquist
·
5 days ago
Fraudsters Abuse DocuSign API for Legit-Looking Invoices
I didn’t see much visibility on this DocuSign hack. This is a situation where the product features were not vetted to understand if they could be misused by malicious fraudsters. There is not a techni...
1 likes
·
0
comments
@M.Rosenquist
·
5 days ago
Joining The Cyber Express Advisory Board
I’m thrilled to join the incredible team at The Cyber Express as a member of their Editorial Advisory Board! It’s an honor to collaborate with an esteemed group of cybersecurity experts, all dedicate...
1 likes
·
0
comments
@M.Rosenquist
·
1 week ago
Perfect Vulnerability for CISO Ultra Reliable Systems
A “Perfect” 10 vulnerability score is not what users of Cisco Ultra-Reliable Wireless Backhaul (URWB) systems were expecting. The recently discovered cybersecurity vulnerability CVE-2024–20418 is rem...
1 likes
·
1
comments
@Hamstert
·
1 week ago
1 Cryptocurrency to Buy Before It Soars 18,600%, Michael Saylor of MicroStrategy lectures
Are you worried it's too late to buy Bitcoin (CRYPTO: BTC)? Although the pace of some of the cryptocurrency's previous run-ups may be difficult to match, there is still plenty of room for it to gro...
1 likes
·
0
comments
@M.Rosenquist
·
1 week ago
Highlights from the InCyber Montreal Forum
I had a tremendous time at the InCyber Montreal forum. The speakers, panels, fellow practitioners, and events were outstanding! I bumped into Dan Lohrmann and Nancy Rainosek before their panel with...
1 likes
·
0
comments
@Hamstert
·
1 week ago
How Safe is the Cyber World?
The cyber world is not always safe, and cybercrime is a growing threat: Cybercrime costs: Cybercrime is expected to cost the world $10.5 trillion annually by 2025. Cybercrimes against women and chi...
1 likes
·
0
comments
@M.Rosenquist
·
3 weeks ago
Malware Can Hide From Email Scanners in Virtual Hard Drives
This is an interesting tactic by cyber attackers – using virtual machine hard drive files to bypass email malware filters! Never underestimate the creativity and resourcefulness of intelligent adver...
2 likes
·
2
comments
@M.Rosenquist
·
3 weeks ago
SEC is Not Accepting Half-Truths
The SEC has fined four major companies for materially misleading investors regarding cyberattacks. Tech in Trouble Regulatory actions have been brought against Unisys, Avaya, Check Point, and Mimec...
1 likes
·
0
comments
@M.Rosenquist
·
3 weeks ago
Are Leaders Ready to Break the Ransomware Cycle
It is good to see US government leaders realize that ransomware is a growing existential threat to our country, at the hands of our adversaries. A top US national cybersecurity advisor stated in a r...
0 likes
·
9
comments
@M.Rosenquist
·
4 weeks ago
The Latest Cybersecurity Vault Interviews
The most influential cybersecurity experts discuss adversaries, risks, cyber warfare, and supply chain outages on the Cybersecurity Insights podcast! Reality of Cybersecurity Risks for AI — Ejona...
3 likes
·
0
comments
@M.Rosenquist
·
4 weeks ago
Fraudulent Worker Schemes Lead to Cyberattacks
Secureworks released a report detailing how North Korean attackers are targeting western countries with a new tactic. Attackers are fraudulently obtaining positions so they can victimize the employ...
1 likes
·
0
comments
@M.Rosenquist
·
4 weeks ago
Rising Cyber Aggression from Nation States
There are big predators in our digital world. In recent keynotes I have been talking about the big 4 aggressive nation states and how they are heavily investing in offensive cyber capabilities that t...
1 likes
·
0
comments
@M.Rosenquist
·
1 month ago
Explaining Cybersecurity - Vizitek Interface Overview
? Explaining cybersecurity is challenging, but with the right visual interface, it is easier to understand the behavioral, technical, and process aspects of cyberattacks. For the full video Explainin...
1 likes
·
0
comments
@M.Rosenquist
·
1 month ago
InCyber Forum Canada 2024
The InCyber Forum Canada 2024 conference is an outstanding event, packed with multiple stages, many thought-leadership panels, and an expansive array of vendors showcasing their latest innovation. Co...
1 likes
·
0
comments
@M.Rosenquist
·
1 month ago
Empowering the Modern CISO: Leading the C-Suite & Boardroom
I had a fantastic time moderating an expert panel at the HMG Strategy 16h Annual Silicon Valley C-Level Technology Leadership Summit! The panel, “Empowering the Modern CISO: Leading the C-Suite &...
1 likes
·
0
comments
@M.Rosenquist
·
1 month ago
Leading a Panel for CISOs
I am looking forward to moderating an expert panel at the HMG Strategy 16th Annual Silicon Valley C-Level Technology Leadership Summit, tomorrow on Tues Oct 8th 2024! The panel will discuss: Empo...
1 likes
·
1
comments
@M.Rosenquist
·
1 month ago
US Takes Down 2 Exchanges Laundering Russian Cryptocurrency
Video: https://youtube.com/shorts/wvRelrVSOcE This is important for two reasons: 1. It disrupts illegal money laundering, in this case, hundreds of millions of dollars that were heading to Russ...
1 likes
·
0
comments
@M.Rosenquist
·
1 month ago
Ransomware Explained - How to Reduce Exposure
? Ransomware is one of the most devastating challenges in cybersecurity today. The attacks are vicious, expensive, impactful, and becoming commonplace. Over the years I have predicted its rise, discu...
2 likes
·
0
comments
@M.Rosenquist
·
1 month ago
Locked In - The Cybersecurity Event of the Year
This is how to redefine CISO events! I had a spectacular time at the “Locked In — The Cybersecurity Event of the Year!” Organized by Rinki Sethi and Lucas Moody, it was nothing short of epic! Forget...
1 likes
·
0
comments
@M.Rosenquist
·
1 month ago
Empowering the Modern CISO: Leading the C-Suite & Boardroom with a Bold Digital Agenda
The expectations of CISOs are rising and their influence must resonate with C-Suite and Boardroom audiences. I am excited at moderating a panel at the upcoming HMGStrategy 16th Annual Silicon Valley...
1 likes
·
0
comments
@Eniarich
·
1 month ago
Crypto is a good alternative
Whether its about cashing out your payement online earned through selling on social media or via website crypto is an alternative methode to cash out. Crypto make it possible for most people who liv...
1 likes
·
0
comments
@M.Rosenquist
·
1 month ago
SECURITYbreak podcast - The Even Darker Side of CyberCrime w/ Matthew Rosenquist
? I had a great discussion on the SECURITYbreak podcast talking about security vulnerability research impacting Apple vision pro VR headsets, MasterCard’s acquisition of threat intelligence vendor Rec...
2 likes
·
0
comments
@M.Rosenquist
·
2 months ago
Frustration Trying to Opt-Out After the National Public Data Breach
The National Public Data breach has been a nightmare, exposing names, addresses, birthdates, emails, phone numbers, and Social Security Numbers of countless individuals — including mine. As a Califo...
1 likes
·
0
comments
@M.Rosenquist
·
2 months ago
Featured in The Cyber Express Magazine
It is my absolute honor to be in this month's issue of The Cyber Express by Cyble, discussing the importance of knowing your cyber adversaries, how good leadership is crucial to success, and the ways...
2 likes
·
0
comments
@M.Rosenquist
·
2 months ago
FBI Warns of North Korea Attacks Against the Crypto Industry
The decentralized finance (DeFi) and cryptocurrency industries are being targeted by North Korean social engineering schemes in highly personalized and convincing ways. Here is an example that the F...
1 likes
·
0
comments
@M.Rosenquist
·
2 months ago
Evolving Cybersecurity: Aligning Strategy with Business Growth
The cybersecurity landscape is evolving at an unprecedented pace, driven by rapid technological advancements and increasingly sophisticated cyber threats. What was sufficient yesterday, will be lacki...
1 likes
·
0
comments
@M.Rosenquist
·
2 months ago
Best Strategic Metric for Cybersecurity
? Conveying the risks and progress for a cybersecurity program to executives is difficult. Over the years, I have explored countless ways to quickly and effectively distill the complexities of cyber r...
1 likes
·
0
comments
@M.Rosenquist
·
3 months ago
Speaking at the CISO and Executive Leadership Event
I am looking forward to speaking at the CISO/Executive Leadership Forum this October 24th-25th in Napa California! This will be such a stellar event and great opportunity to network with amazing lead...
1 likes
·
0
comments
@M.Rosenquist
·
3 months ago
The Ongoing Battle of Detecting GenAI-Created Content
The arms race continues between those attempting to detect GenAI-created content and those who want to keep their origins concealed. For example, detecting if ChatGPT was employed to write content, s...
1 likes
·
0
comments
@M.Rosenquist
·
3 months ago
Lessons Learned from the CrowdStrike Outage
? The recent CrowdStrike outage provides valuable lessons in how to avoid causing problems and being more resilient when faced with 3rd party vendor issues. CEOs, CIOs, and Board members have a clear...
1 likes
·
0
comments