Home page
Communities
Stats
About read.cash
Register
Login
Open register popup
read.cash
Topics
Life
Cryptocurrency
Blog
Writing
Experiences
Story
Blogging
Crypto
Bitcoin Cash
Thoughts
Blockchain
Money
BCH
Experience
Personal
Cryptocurrencies
read.cash
Bitcoin
Freewrite
Finance
Reality
Motivation
Love
Investment
Personal Thoughts
Journey
Family
Random
Travel
Food
...All topics...
Communities
Login
Get Started
Cybersecurity and Privacy (e3e6)
285
Cybersecurity, privacy, and digital trust
Join the community
Moderators
@M.Rosenquist
·
6 days ago
Task Force Gives Terrible Advice About Ransomware
? I couldn’t help myself, I had to rant about this! A ‘security research’ group is recommending against banning ransomware payments, which would eradicate these attacks from occurring, and instead wan...
1 likes
·
0
comments
@M.Rosenquist
·
6 days ago
Guardians of Academia - Battling Cyber Threats in Higher Education
? Donna Kidwell, CISO of Arizona State University, is one of the best and brightest in our community! I am continually amazed at her insights, strategic focus, and ability to creatively tackle some of...
1 likes
·
0
comments
@M.Rosenquist
·
3 weeks ago
Facebook Hacked Users Phones to Snoop on Encrypted Data
Media is reporting that documents emerging from a legal case are revealing that in 2016 Facebook created a project to intercept and decrypt traffic on user’s phones to gain a competitive advantage. ...
3 likes
·
0
comments
@MintDice
·
1 month ago
Ethereum Phishing Scams on the Rise: How to Protect Your Crypto
Scams in the cryptocurrency world are all too common, and an already bad problem grew worse in February. According to an article on Bitcoin.com , phishing scammers were able to siphon over $47 millio...
1 likes
·
2
comments
@M.Rosenquist
·
1 month ago
Researchers Give Birth to the First GenAI Worm
It was bound to happen — researchers have created a 1st generation AI worm that can steal data, propagate malware, and spread via email. Ben Nassi from Cornell Tech, Stav Cohen from the Israel Insti...
1 likes
·
0
comments
@M.Rosenquist
·
1 month ago
Best Practices in Securing 3rd Party Supply-Chain with Cassie Crossley
? The Cybersecurity Vault episode 28 Securing the software supply chain, including 3rd party vendors and suppliers, is a difficult problem that the cybersecurity industry is trying to tackle. The thr...
1 likes
·
0
comments
@MintDice
·
1 month ago
WARNING: New Crypto Scam on Telegram
As much as we love cryptocurrency, it is well-known that the crypto space is filled with scams. A new scam that recently popped up on our radar is worse than most, and we want to make sure everyone is...
5 likes
·
2
comments
@M.Rosenquist
·
2 months ago
Keynote: Critical Infrastructures Are Under Attack From Aggressive Nation States
? Critical Infrastructures are under attack from aggressive nation states! Governments must step forward to help protect these crucial sectors and the services they provide to citizens. My cybersecur...
1 likes
·
2
comments
@M.Rosenquist
·
2 months ago
Cybersecurity Panel at CLEA
I had a great time speaking today at the CIO/CISO Executive Leadership Alliance (CLEA) meeting with Jesse Bociek and Rocco Grillo (these luminaries are so smart)! Excellent discussions regarding risk...
1 likes
·
0
comments
@M.Rosenquist
·
2 months ago
Incident Materiality and Meeting New SEC Requirements with Malcolm Harkins
? The new SEC requirements for public companies includes reporting within 4 days of determining that a cybersecurity incident is ‘material’ to the company. But what is materiality? In this episode, I...
2 likes
·
0
comments
@M.Rosenquist
·
2 months ago
Creating A Sustainable Cybersecurity Industry
? The cybersecurity industry is facing many sustainability challenges. I enjoyed a lengthy discussion with Terry Thompson at Top Cyber Pro to highlight the strategic problems and opportunities! Give...
2 likes
·
0
comments
@M.Rosenquist
·
2 months ago
Online Information Session: MS Cybersecurity at Dominican University of California
Dominican University of California offers a fully online, one-year, STEM-designated graduate cybersecurity program starting fall 2024. Join the next online information session with Joanna Grama, JD...
5 likes
·
1
comments
@M.Rosenquist
·
3 months ago
Career Advice to Cybersecurity Students – Replay of Live Presentation
? I was honored to speak at the recent Cyber Proud event to an audience of students and graduates who were seeking advice on pursuing a career in #cybersecurity. There is a chasm between entry level...
2 likes
·
1
comments
@M.Rosenquist
·
3 months ago
The Unseen Threats: Anticipating Cybersecurity Risks in 2024
Nation-state attacks will be the dominant influence on the capabilities, growth, and impacts seen across the cybersecurity industry in 2024. Years of investment, innovation, and willingness to conduc...
1 likes
·
1
comments
@Garage.Writer
·
3 months ago
Navigating the Evolution of the Internet of Things (IoT): A Cybersecurity and Privacy Odyssey
Welcome, readers, to a journey through the ever-evolving landscape of the Internet of Things (IoT). In today's fast-paced world, where connectivity is king, IoT has emerged as a transformative force....
1 likes
·
1
comments
@M.Rosenquist
·
3 months ago
Embracing Innovation and Managing Cyber Risks
? I had a great discussion with Julian, from eChannelNEWS where we discussed the pivotal role of information dissemination and the construction of a fortified cybersecurity ecosystem. Of particular im...
1 likes
·
0
comments
@M.Rosenquist
·
3 months ago
Tech Education Series #9: Are There Cybersecurity Roles That Leverage AI Skills
? Welcome to the Tech Education Series, where current students and life-long learners ask questions to industry professionals in search of meaningful insights. Check out all the questions and answer...
1 likes
·
0
comments
@M.Rosenquist
·
3 months ago
Carta's Reputation Crisis: How they can Rebuild Trust
? Carta has a full blown reputation crisis underway, but all is not lost, if the company acts in a meaningful and ethical way! In today’s video, I give my take on how they can recover and rebuild tr...
1 likes
·
0
comments
@M.Rosenquist
·
3 months ago
Most advanced hack ever and why you should be concerned
? One of the most impressive hacks ever! Such tremendous sophistication is the hallmark of Nation State level attackers. Truly epic, but should you be worried? Some say no, as the attack is not curr...
1 likes
·
0
comments
@M.Rosenquist
·
3 months ago
5 Biggest Mistakes of Cybersecurity Programs
Another year, another repeat of cybersecurity mistakes! To break the cycle and avoid them, we must learn to recognize the biggest issues that cybersecurity organizations are making. That is why I cr...
1 likes
·
0
comments
@Garage.Writer
·
3 months ago
Guardians of the Digital Vault: Navigating Cybersecurity and Privacy in Cryptocurrency
In the ever-evolving landscape of the digital age, where transactions transcend borders and financial landscapes reshape, the rise of cryptocurrency has been nothing short of revolutionary. As we embr...
1 likes
·
0
comments
@M.Rosenquist
·
3 months ago
Tech Education Series #8: What Character or Behavioral Skills are Not Adequately Being Taught
? Tech Education Series #8: What Character or Behavioral Skills are Not Adequately Being Taught Welcome to the Tech Education Series, where current students and life-long learners ask questions to i...
2 likes
·
0
comments
@Garage.Writer
·
3 months ago
The Cryptocurrency Conundrum: Ransomware's Unlikely Accomplice
In an increasingly digitized world, the rise of ransomware attacks has become an alarming trend, posing a significant threat to individuals and organizations alike. What makes this cyber threat even m...
1 likes
·
0
comments
@M.Rosenquist
·
3 months ago
The Cybersecurity Vault - Now is the Time to Improve Cybersecurity Metrics
? We are doing cybersecurity metrics wrong! There are better ways and my guest Rick Howard, the CSO at N2K and longtime cybersecurity metrics expert, provides insights into how metrics can support cyb...
1 likes
·
0
comments
@M.Rosenquist
·
3 months ago
An In-Depth Look at the Evolution and Future of Cybersecurity
Thanks Carson Spitzke, from Smartech Daily, for writing up a discussion on how the cybersecurity industry is evolving and the big challenges we will be facing in the coming years. Read the full art...
1 likes
·
0
comments
@M.Rosenquist
·
3 months ago
Medical Emergency Assistance - Thank You
I have been an active volunteer as part of corporate medical response teams for more than 20 years of my career. It has never been my primary job, but I like having the skills to help when really ba...
3 likes
·
2
comments
@M.Rosenquist
·
4 months ago
Law Enforcement ALPHV Ransomware Takedown
Law enforcement scores a win against one of the most prolific ransomware criminal groups, ALPHV/BlackCat ! This truly is a cybersecurity holiday gift for everyone across the digital world! Suc...
1 likes
·
0
comments
@M.Rosenquist
·
4 months ago
Tech Education Series #7: How can I Break Into My First Cybersecurity Role?
? Welcome to the Tech Education Series, where current students and life-long learners ask questions to industry professionals in search of meaningful insights. Check out all the questions and answers...
1 likes
·
0
comments
@M.Rosenquist
·
4 months ago
SEC Case Against SolarWinds – Has the SEC Gone Too Far?
? The SEC case against SolarWinds and their CISO continues to reverberate across the cybersecurity community. I talk with Edward Amoroso, the Founder and CEO of TAG Infosphere, to discuss different as...
1 likes
·
0
comments
@MintDice
·
4 months ago
Crypto AG: The Swiss Firm Owned by the CIA
It’s almost too crazy to believe. The United States CIA actually owned a firm in Switzerland, which allowed them to spy on the world. But it’s true. It happened, and the entire scheme lasted over 50 y...
1 likes
·
0
comments