Home page
Communities
Stats
About read.cash
Register
Login
Open register popup
read.cash
Topics
Life
Cryptocurrency
Blog
Writing
Experiences
Story
Blogging
Crypto
Bitcoin Cash
Thoughts
Blockchain
Money
BCH
Experience
Personal
Cryptocurrencies
Bitcoin
read.cash
Freewrite
Finance
Reality
Motivation
Love
Investment
Personal Thoughts
Journey
Family
Random
Travel
Food
...All topics...
Communities
Login
Get Started
Cybersecurity and Privacy (e3e6)
294
Cybersecurity, privacy, and digital trust
Join the community
Moderators
@M.Rosenquist
·
5 days ago
Frustration Trying to Opt-Out After the National Public Data Breach
The National Public Data breach has been a nightmare, exposing names, addresses, birthdates, emails, phone numbers, and Social Security Numbers of countless individuals — including mine. As a Califo...
1 likes
·
0
comments
@M.Rosenquist
·
6 days ago
Featured in The Cyber Express Magazine
It is my absolute honor to be in this month's issue of The Cyber Express by Cyble, discussing the importance of knowing your cyber adversaries, how good leadership is crucial to success, and the ways...
2 likes
·
0
comments
@M.Rosenquist
·
1 week ago
FBI Warns of North Korea Attacks Against the Crypto Industry
The decentralized finance (DeFi) and cryptocurrency industries are being targeted by North Korean social engineering schemes in highly personalized and convincing ways. Here is an example that the F...
1 likes
·
0
comments
@M.Rosenquist
·
2 weeks ago
Evolving Cybersecurity: Aligning Strategy with Business Growth
The cybersecurity landscape is evolving at an unprecedented pace, driven by rapid technological advancements and increasingly sophisticated cyber threats. What was sufficient yesterday, will be lacki...
1 likes
·
0
comments
@M.Rosenquist
·
2 weeks ago
Best Strategic Metric for Cybersecurity
? Conveying the risks and progress for a cybersecurity program to executives is difficult. Over the years, I have explored countless ways to quickly and effectively distill the complexities of cyber r...
1 likes
·
0
comments
@M.Rosenquist
·
1 month ago
Speaking at the CISO and Executive Leadership Event
I am looking forward to speaking at the CISO/Executive Leadership Forum this October 24th-25th in Napa California! This will be such a stellar event and great opportunity to network with amazing lead...
1 likes
·
0
comments
@M.Rosenquist
·
1 month ago
The Ongoing Battle of Detecting GenAI-Created Content
The arms race continues between those attempting to detect GenAI-created content and those who want to keep their origins concealed. For example, detecting if ChatGPT was employed to write content, s...
1 likes
·
0
comments
@M.Rosenquist
·
1 month ago
Lessons Learned from the CrowdStrike Outage
? The recent CrowdStrike outage provides valuable lessons in how to avoid causing problems and being more resilient when faced with 3rd party vendor issues. CEOs, CIOs, and Board members have a clear...
1 likes
·
0
comments
@M.Rosenquist
·
1 month ago
Chaos in Cyber Regulations and Lawsuits
? The Supreme Court struck down the Chevron Doctrine, sharply cutting back the power of federal agencies to interpret the laws they oversee and ruled that courts should rely on their own interpretatio...
1 likes
·
0
comments
@M.Rosenquist
·
1 month ago
California DMV Implementing Blockchain Tech
California’s Department of Motor Vehicles will implement a blockchain to prevent vehicle title fraud . They will use Ava Labs’s Avalanche blockchain to allow over 39 million residents to claim and ac...
1 likes
·
0
comments
@M.Rosenquist
·
1 month ago
Prestigious Cybersphere CISO Advisory Board Unveils Full Member Listing
Tackling the biggest problems in cybersecurity requires superb insights and collaboration across the industry. This CISO Advisory Board will be a catalyst for constructive communication, practical in...
1 likes
·
0
comments
@M.Rosenquist
·
1 month ago
CrowdStrike Global Outage: Unpacking the Fallout and Future
? The Cybersecurity Vault - episode #36, with guest Ira Winkler Today we are going to talk about the massive global IT outage, effecting over 8 million devices, caused by the cybersecurity vendor Cro...
1 likes
·
0
comments
@M.Rosenquist
·
1 month ago
Failures of CrowdStrike Quality Testing
? Details emerge on how a bad CrowdStrike update was allowed to land on Windows systems and cause over 8 billion computers to fail. I discuss their leadership and break down the preliminary Post Inci...
1 likes
·
0
comments
@M.Rosenquist
·
1 month ago
Learning from CrowdStrike’s Quality Assurance Failures
Let’s talk about CrowdStrike’s quality assurance failures! Thanks to Help Net Security for publishing my opinion piece. Take a look for a more in-depth explanation of how the bad update made it to ov...
1 likes
·
0
comments
@M.Rosenquist
·
1 month ago
CrowdStrike Outage Explained in Plain English
? Let’s break down the CrowdStrike outage in non-technical terms! Thanks for watching! Be sure to subscribe for more Cybersecurity Insights! Follow me on LinkedIn: https://www.linkedin.com/in/matth...
1 likes
·
0
comments
@M.Rosenquist
·
1 month ago
New Microsoft Recovery Tool for CrowdStrike Issue on Windows Endpoints
Not sure who need this resource, but Microsoft updated its Recovery Tool for the CrowdStrike issue on Windows endpoints: Here is the link to the Microsoft Tech Community Support Site: https://techc...
3 likes
·
1
comments
@M.Rosenquist
·
1 month ago
CrowdStrike Outage Impacts Over 8 Million Computers
? The recent CrowdStrike outage, that continues to have global implications, reinforces the fact that cybersecurity solutions help manage cyber attack risks, but can also be a source of risk. The leve...
2 likes
·
0
comments
@M.Rosenquist
·
1 month ago
Massive CrowdStrike IT Outage Has Global Implications for Cybersecurity
The world experienced a digital pandemic of systems going offline and displaying the dreaded Windows Blue Screen of Death (BSOD), due to a catastrophic failure caused by a flawed file in an update to...
1 likes
·
0
comments
@M.Rosenquist
·
1 month ago
AT&T Data Breach: Understanding the Fallout
? As an AT&T customer, I did receive the unwelcome news that they suffered a data breach. Here is a rundown for what you should to know. BREACH DETAILS · This is a sizable data breach of about 109...
1 likes
·
0
comments
@M.Rosenquist
·
1 month ago
Rise of Aggressive Nation State Activities
? This is the replay of the live LinkedIn interview with Matthew Rosenquist (CISO at Mercury Risk. - Formerly Intel Corp, Cybersecurity Strategist, Board Advisor, Keynote Speaker) to discuss the Rise...
1 likes
·
0
comments
@M.Rosenquist
·
1 month ago
Google Wants to Up-Sell AI Security to Gmail Customers
? Google wants to up-sell enterprise Gmail users for AI security enhancements, when in reality the feature is mitigating the advances that attackers are making through their own innovative use of AI,...
1 likes
·
0
comments
@M.Rosenquist
·
2 months ago
Microsoft in Cybersecurity Leadership Crisis – Open Letter to the CEO
There is no indication that the root of Microsoft’s cybersecurity issues is being addressed. In fact, all indications are that the executive team is somewhat worried and bewildered at the diverse and...
1 likes
·
0
comments
@M.Rosenquist
·
2 months ago
YouTube's Deepfake Removal Feature
YouTube has announced that it will facilitate requests to remove AI generated content that is created to look or sound like you. It is a nice gesture on behalf of YouTube, but the process to protect...
2 likes
·
0
comments
@M.Rosenquist
·
2 months ago
Rising Threat of Russia’s Cyber Warfare with Mikko Hypponen
? Rising Threat of Russia’s Cyber Warfare with Mikko Hypponen The Cybersecurity Vault — episode 35 Some of the most aggressive cyber attacks originate out of Russia. The 2022 invasion of Ukraine was...
1 likes
·
0
comments
@M.Rosenquist
·
2 months ago
Cybersecurity is Adversarial – Our Failures are Attackers Opportunities
? The Cybersecurity Vault - episode 34, with guest Chase Cunningham. We take a hard look at when organizations make big cybersecurity mistakes, how the attackers see those as opportunities, and how t...
1 likes
·
0
comments
@M.Rosenquist
·
2 months ago
How Leaders Build a Strong Security Culture and Bridge the Gap Between Psychology and Cybersecurity
? As the saying goes “Culture trumps strategy”, which very much holds true when it comes to cybersecurity! Pooja Shimpi, Sameer Gemawat, and I discuss strategies leaders can use to promote a robust...
1 likes
·
1
comments
@M.Rosenquist
·
2 months ago
Protecting From Cloud Based Attacks - Webinar
? Cloud attacks are different. Attackers can strike extremely fast using advanced techniques and automation. Is your team prepared to investigate and respond to cloud threats in less than 10 minutes?...
1 likes
·
0
comments
@M.Rosenquist
·
2 months ago
Kraken Hacked by Cybersecurity Researchers
When cybersecurity researchers break the law, destroy their reputation, and make the bug-bounty research community look bad. TL:DR Researchers found a vulnerability in a cryptocurrency exchange. The...
1 likes
·
0
comments
@M.Rosenquist
·
2 months ago
Modern CISO Network: A directory of board-ready security leaders
I never imagined I would see my face in the The New York Times! Yet there I am, thanks to Lacework! I am so very honored to be included in their latest edition of Modern CISO Network: A directory of...
1 likes
·
0
comments
@M.Rosenquist
·
2 months ago
Reality of Cybersecurity Risks for AI
? The explosive growth of GenAI has serious repercussions for cybersecurity. But is the fear being overplayed in the media? What are the realistic risks and what should security and business leaders b...
2 likes
·
0
comments