BlogHide Resteemsmrosenquist (69)in technology • 4 days agoBiggest Challenge in CybersecurityIn the next few years, the biggest challenge in cybersecurity won’t be dealing with a specific threat, but rather conveying a meaningful value proposition throughout the organization, and especially…mrosenquist (69)in privacy • 7 days agoAmazon Alexa to Mimic the Voice of AnyoneEthical and #Privacy issues abound. If a malicious actor combines an impersonated voice and deepfake video of a target, they can make others believe anything or harass them in unthinkable ways. We…mrosenquist (69)in cybersecurity • last monthCybersecurity Costs Skyrocket 60%Per the 2022 Hiscox Cyber Readiness report (survey), #cybersecurity spending increased 60% and median costs of incidents have risen 29% in the past year! This is not sustainable! Something must…mrosenquist (69)in cybersecurity • 2 months agoValue is the Cybersecurity Blind Spot - Speaking at the SPHERE22 ConferenceValue is Cybersecurity’s blind spot, it is our Achilles Heel. The industry currently suffers from a weakness to understand, align, and showcase its maximum potential value, which extends beyond…mrosenquist (69)in cryptocurrency • 2 months agoUS Sanctions Blender.io for Supporting TerrorUS Treasury sanctions a cryptocurrency mixing site for supporting North Korean hackers who have been stealing hundreds of millions of dollars. Blender.io is a virtual currency mixing site that…mrosenquist (69)in cybersecurity • 2 months agoRansomware is Funding Russian AggressionRansomware attacks and payments are increasing, with most revenue going to Russian attackers. It is time to revisit outlawing Ransomware payments. Some stats to hammer the situation home: Sophos…mrosenquist (69)in cybersecurity • 2 months agoHow Cybersecurity Risks Must Be Fixed to Build Trust in Technology InnovationThanks to DynamicCISO for a great discussion about the changing landscape of cybersecurity and how we must all adapt to drive trust into the global digital ecosystem. The key to our success is to…mrosenquist (69)in cybersecurity • 2 months agoStrategic Cybersecurity Capability ProcessI see far too many failures and missed opportunities by cybersecurity organizations that have not adopted meaningful sustainability structures to maintain efficacy and efficiency. A healthy…mrosenquist (69)in ai • 3 months agoNew AI system DALL E2 Creates Crazy Realistic ImagesA new AI system that can synthesize images based upon natural language or image inputs. Want to see a photorealistic image of an astronaut riding a horse in space or a koala on a motorcycle? How…mrosenquist (69)in cybersecurity • 5 months agoThe Ugly Path to Avoid a War in UkraineRussian tanks may invade Ukraine before the ink is dry on this article, as part of maneuvers to undermine the independence of Ukraine. International negotiations are underway but nobody believes…mrosenquist (69)in privacy • 5 months agoHappy International Privacy DayHappy Privacy Day to all those privacy professionals out there that work to make our digital world more safe, respectful, and private. Thanks for watching. If you are interested in cybersecurity…mrosenquist (69)in cybersecurity • 5 months agoInterview - Taxonomy of Cybersecurity Roles & Responsibilities with Deidre DiamondDive into the ever-changing roles and responsibilities of the cybersecurity space with seasoned leader Deidre Diamond on this new episode of The Cybersecurity Vault. Learn about some of the…mrosenquist (69)in cybersecurity • 5 months agoVlog - Why is Norton adding a cryptocurrency miner to their product and should we be worried?Norton recently announced its Anti-Virus product will have a new feature that enables mining of Ethereum cryptocurrency for their customers, if they choose to participate. Is this a nice benefit for…mrosenquist (69)in cybersecurity • 5 months agoVideo – Announcing 2022 Cybersecurity Predictions2022 will be a very tumultuous year for cybersecurity professionals. The underlying fundamentals that drive major shifts of the cybersecurity industry — technologies, threats, and economic factors…mrosenquist (69)in cybersecurity • 6 months agoIllicit Crypto Transaction Percentages are at an All Time LowIllicit cryptocurrency transactions represented only 0.15% of transaction volume in 2021, according to the latest industry report from Chainalysis. That is probably the lowest of any global…mrosenquist (69)in cybersecurity • 6 months agoCybersecurity Insights Video - Criminalizing Ransomware Payments with Malcolm HarkinsRansomware is a growing scourge. Is it possible to eradicate this entire class of attacks? I think it is but in today’s Cybersecurity Insights interview I have a lively debate with Malcolm Harkins…mrosenquist (69)in cybersecurity • 6 months agoCybersecurity Insights Video: Deficient Forethought for Digital Technology Risks with Alexander SteinTechnology can be mesmerizing. We are all lured by the seemingly endlessly tantalizing stream of emerging technologies that promise to connect and enrich our lives. But there is a potential dark…mrosenquist (69)in cryptocurrency • 6 months agoTop 50 Global Thought Leaders on CryptocurrencyGuess who made the Thinkers360 Top 50 Global Thought Leaders on Cryptocurrency? Yup, I made the list at number 26. Cryptocurrency is the next evolution of money and is gaining more adoption…mrosenquist (69)in cybersecurity • 6 months agoCybersecurity Insights video interview - Growing Cyber Risks of Firmware with Scott SchefermanFirmware is the little-talked-about component of every digital device and computer system, that possesses tremendous control, and is now being targeted by cyber attackers. In today’s Cybersecurity…mrosenquist (69)in cybersecurity • 6 months agoTop 222 Influencers for 2022Honored to be recognized as part of the Top 222 Influencers for 2022 from Engati. Such a great list of people contributing to their fields and driving collaboration among professionals for a better…