mrosenquist (71)in #cybersecurity • 3 days agoCybersecurity Perspectives 2025 – Interviews with Experts: Dan LohrmannThe Cybersecurity Vault - episode 41, with guest Dan Lohrmann. 2025 will be an interesting year for the cybersecurity industry! Dan Lohrmann provides his insights to the…mrosenquist (71)in #cybersecurity • 4 days agoPersonal AI Supercomputers are a RealityWe get closer every quarter to being able to functionally accomplish real-time deepfake capabilities from our phones - which will usher in a new era of fraud. The miniaturization…mrosenquist (71)in #cybersecurity • 5 days agoThe Psychology of Phishing Attackers are masterful at using Social Engineering techniques to victimize others. Sumona, the founder of the MindShield institute, outlines the challenges of adapting to…mrosenquist (71)in #cybersecurity • 6 days agoThe Psychology of Phishing: Why Smart People Fall for Dumb TricksThe Cybersecurity Vault — episode 40, with guest Sumona Banerji Attackers are masterful at using Social Engineering techniques to victimize others. They take advantage of…mrosenquist (71)in #cybersecurity • 11 days agoCybersecurity Misuse vs Technical VulnerabilityOne of my 2025 cybersecurity predictions is we will see more victimization through the use of products and services which don’t have a technical vulnerability, but rather design…mrosenquist (71)in #cybersecurity • 13 days agoThe CISO's Role: Evolving Expectations In CybersecurityThe rapidly evolving expectations of cybersecurity are pushing CISOs to adapt and demonstrate greater value to their organizations. This session explores the changing role of the…mrosenquist (71)in #cybersecurity • 15 days agoHere's my 2024 LinkedIn RewindHere’s my 2024 LinkedIn Rewind, as created by Coauthor.studio: 2024 Highlights: • Named Top 10 Cybersecurity Thought Leader by Thinkers360 and made the top cybersecurity…mrosenquist (71)in #cybersecurity • 17 days agoTop 25 B2B Tech Influencers for 2025I am deeply honored and thrilled to be recognized this year by Clutch as part of an elite community of technology leaders and influencers. This is an incredible list of…mrosenquist (71)in #cybersecurity • 23 days agoThe Cyber Frenemy of the West: Understanding ChinaChina is one of the most aggressive nation states when it comes to cybersecurity. They possess a renown global proficiency in attacking digital networks, harvesting sensitive…mrosenquist (71)in #cybersecurity • 25 days agoMicrosoft's Recall Feature: Another Systemic Cybersecurity FailureMicrosoft has stumbled yet again. Its Recall feature — intended to enhance user experience by periodically capturing screenshots — has become a glaring example of how…mrosenquist (71)in #cybersecurity • last monthTime of Reckoning – Reviewing My 2024 Cybersecurity PredictionsThe brutal reality is that cybersecurity predictions are only as valuable as their accuracy. As 2024 comes to a close, I revisit my forecasts to assess their utility in guiding…mrosenquist (71)in #cybersecurity • last monthImportance of Soft Skills in CybersecurityThe Cybersecurity Vault - episode 38, with guest Evgeniy Kharam. Soft Skills are essential cybersecurity as they enable communication, teamwork, leadership, and relationship…mrosenquist (71)in #cybersecurity • last monthWhat You Need to Know About Cybersecurity and AII had a great time chatting with the amazing Shira Rubinoff and Rinki Sethi on the Clarity podcast, discussing what people need to know about Cybersecurity and Artificial Intelligence!mrosenquist (71)in #cybersecurity • last monthThe Dark Side of Microsoft’s New Voice Cloning Feature: Innovation Enabling RiskMicrosoft will release a new Teams feature that allows users to clone their voice so the system can translate their conversation into different languages in real time. However…mrosenquist (71)in #cybersecurity • 2 months agoHackers Impact Coffee Supply Chain Becomes National NewsWhat does it say about our industry when a cybersecurity compromise that, in a software supply-chain vendor creates a minor inconvenience (forcing timecards to be written down by…mrosenquist (71)in #cybersecurity • 2 months agoIs Cyber Threat Intelligence Worthless?I was recently asked “What do intelligence reports do? They appear worthless!” I found the question both funny and ironic. Unfortunately, I had to gently deliver some…mrosenquist (71)in #cybersecurity • 2 months ago2024 Top 50 Thought Leaders on Risk ManagementCongrats to the Top 50 Global Thought Leaders and Influencers on Risk Management 2024! Thanks Thinkers360 for the recognition to myself and so many of the hard working…mrosenquist (71)in #bitcoin • 2 months agoBitcoin Has Crossed $97kBitcoin has now crossed the $97k mark! It is going absolutely bonkers right now!mrosenquist (71)in #social • 2 months agoIs Anyone Else Also Posting on Bulb?Are any of my friends, followers, and fellow Hive readers on Bulb? There are weekly challenges and rewards for reading and posting. Referral Link to join and earn:mrosenquist (71)in #cybersecurity • 2 months agoFraudsters Abuse DocuSign API for Legit-Looking InvoicesI didn’t see much visibility on this DocuSign hack. This is a situation where the product features were not vetted to understand if they could be misused by malicious fraudsters.…