Home page
Communities
Stats
About read.cash
Register
Login
Open register popup
read.cash
Topics
Life
Cryptocurrency
Blog
Writing
Experiences
Story
Blogging
Crypto
Bitcoin Cash
Thoughts
Blockchain
Money
BCH
Experience
Personal
Cryptocurrencies
read.cash
Bitcoin
Freewrite
Finance
Reality
Motivation
Love
Investment
Personal Thoughts
Journey
Family
Random
Travel
Food
...All topics...
Communities
Login
Get Started
For example:
wedding
@M.rosenquist
Relevant
Newest
All
Articles/Posts
Communities
Comments
Users
(comment)
Almost all of the top 50 economic nations have a dedicated cyber capability, but very few are targeting Critical Infrastructures to specifically impact civilians.
@M.Rosenquist
2 months ago
(comment)
Thanks! Yes, it does take some personal time, but it is worth it.
@M.Rosenquist
4 months ago
(comment)
Agreed! We must be careful as we move forward.
@M.Rosenquist
1 year ago
(comment)
Security is slowly becoming a purchase criteria, which is progress. Labels are problematic in several ways, but may help overall by raising the awareness and reinforcing security competitiveness am...
@M.Rosenquist
1 year ago
(comment)
Yes! Happy to be on your podcast. Send me a DM in LinkedIn to setup a day/time (I am in Pacific Time zone)
@M.Rosenquist
1 year ago
(comment)
Yes, I post to both YouTube and Odysee
@M.Rosenquist
1 year ago
(comment)
You have some great ideas there! Automation and visualization really help incident response. The challenge is to make it scalable and perform at speed.
@M.Rosenquist
1 year ago
(comment)
In the case of Ransomware, undermining the motivation of the attackers. If they know they won't get paid for ransomware attacks, financially motivated aggressors will choose other methods of attack...
@M.Rosenquist
2 years ago
(comment)
Not sure, I didn't run the code myself.
@M.Rosenquist
2 years ago
(comment)
Completely agree. We want the benefits of digital innovation but should also respect that it is accompanied by equitable risks which must be purposefully managed.
@M.Rosenquist
2 years ago
(comment)
Very nice list! A wide range of influencers gives the platform a great depth.
@M.Rosenquist
2 years ago
(comment)
Thanks! Passwords (user credentials in general) is an interesting topic. The history, current usage, and how they will change in the future is a great area to study.
@M.Rosenquist
2 years ago
(comment)
Great list of reading!
@M.Rosenquist
2 years ago
(comment)
Chuck and I always have great discussions and this is such a relevant topic. Will be fun and informative.
@M.Rosenquist
2 years ago
(comment)
Thanks for the compliment!
@M.Rosenquist
2 years ago
(comment)
It becomes part of a regulation which then governs the business practice of organizations. Those are the ones paying the huge ransoms (tens of millions per ransom sometimes). The control structure...
@M.Rosenquist
2 years ago
(comment)
The attackers are smart and constantly evolving! Have you looked at the NoMoreRansom.org site? It has many decryptors for older versions of ransomware. It does not work on all variants, but it is...
@M.Rosenquist
2 years ago
(comment)
I think that is one of the major challenges. How does a label convey the risks and consequences to general consumers, in a way they are better armed to make informed purchase decisions? Cybersecur...
@M.Rosenquist
2 years ago
(comment)
It will take everyone to work together!
@M.Rosenquist
2 years ago
(comment)
Scams are increasing and social engineering is the primary path. Great job in being aware, cautious, and avoiding this scam! Well done.
@M.Rosenquist
2 years ago
(comment)
I too really dislike the path of regulation... But I do recognize that when the natural forces that should drive organizations to align to consumer benefits is not working, regulation is needed. P...
@M.Rosenquist
2 years ago
(comment)
Thanks. Correcting the typo!
@M.Rosenquist
3 years ago
(comment)
Just industry advice to put proper security and recovery measures in place before something bad hits.
@M.Rosenquist
3 years ago
(comment)
I just type what I think.
@M.Rosenquist
3 years ago
(comment)
Oh, I still get people saying Apple is immune to malware and only Windows gets hacked.... Based upon your insights, I know that is not the case with you, but I just want to make sure any readers are...
@M.Rosenquist
3 years ago
(comment)
In some companies I have seen such phishing (test) campaigns hook 60% of employees before a thorough and continuous phishing training program is put in place. After most fall quickly to 5% then gri...
@M.Rosenquist
3 years ago
(comment)
Linux does have its own security problems, so it is not infallible. VPN's also have security and privacy issues, so choose wisely and use appropriately with other controls. Privacy browsers go a l...
@M.Rosenquist
3 years ago
(comment)
I could not find one that was available under Creative Commons
@M.Rosenquist
3 years ago
(comment)
Wow, you are pouring everything you are into the platform. Dedicated. ...and probably crazy. But push where you feel it is right. You have earned it.
@M.Rosenquist
3 years ago
(comment)
Outstanding! Love the article and the real explanation about the embedded security. Putting money on the line to prove it is simply icing on the cake! Well played sir! Well played.
@M.Rosenquist
3 years ago
«
1
2
»