BlogHide Resteemsmrosenquist (70)in cybersecurity • 3 days agoDominican University Cybersecurity AdvisoryI am so very proud to support academia in preparing the next generation of cybersecurity leaders! This is how the industry improves, shares knowledge forward, and collaborates to make digital…mrosenquist (70)in cybersecurity • 3 days agoCyberattacks Disrupting the BattlefieldThe face of war is constantly changing. Cyberattacks have often been discounted as a support function at best when it comes to winning on a traditional battlefield. But if military weapons supply…mrosenquist (70)in cryptocurrency • 6 days agoTips to Avoid Online Fraud and Crypto TheftI recently came across a victim’s story, in how she was scammed online and ultimately lost all her cryptocurrency. In reading the story, and extrapolating from my four decades of working against…mrosenquist (70)in cybersecurity • 11 days agoIran Focuses Cybercriminals on Foreign EnemiesAggressive nation-states are increasingly leveraging cyberattacks as tools to advance their foreign policy objectives. In this case, Iran sponsored Pay2Key Ransomware-as-a-Service (RaaS) is…mrosenquist (70)in cybersecurity • 12 days agoA Shortsighted Model for CybersecurityI have an issue with this! No disrespect to the original poster creator, who is the sheer levels of complexity and advocating the need for multiple tools to work together, but cybersecurity will…mrosenquist (70)in life • 16 days agoThe Fight Behind July 4thToday we honor those rebels, the colonists who stood against the most powerful navy and best trained professional army at the time, for a chance to be free to plot their own course in history - free…mrosenquist (70)in cybersecurity • 20 days agoAI Slop will Fuel the Next Wave of Social Engineering Cybercrime AttacksSimple Math: Rise of AI Slop (rapid ability to generate believable content) x Cybercriminals seeking to commit…mrosenquist (70)in cybersecurity • 23 days agoLet’s Try Positive Reinforcement Cybersecurity TrainingIsn’t it about time the cybersecurity industry shifts towards positive reinforcement cybersecurity training? We must consider that there might be better ways to change cybersecurity behaviors than…mrosenquist (70)in cybersecurity • 25 days agoBankers Association’s Attack on Cybersecurity TransparencyA coalition of banking industry associations, including SIFA, the American Bankers Association (ABA), Bank Policy Institute (BPI), and several other lobbying groups have made a disgraceful appeal to…mrosenquist (70)in cybersecurity • 26 days agoThe Wildest Stage to Talk About CybersecurityI was recently asked what my favorite cybersecurity speaking venue has been. Although not the largest keynote audience by sheer numbers, speaking at the Sphere 2022 conference sticks out as a unique…mrosenquist (70)in cybersecurity • 27 days agoSuccessful Military Attacks are Driving Nation States to Cyber OptionsWith daring military attacks, kinetic warfare is shifting the balance of power in regions across the globe, upending the perception of power projection. Powerful nations are reeling from the impacts…mrosenquist (70)in cybersecurity • 28 days agoThreat Casting a Nation State Attack on Critical Infrastructure Scenario at CognectCon2025During exercises at CognectCon2025 a number of cyberattack scenarios were discussed that highlighted the risks of cyber attackers leveraging cognitive vulnerabilities to cause major impacts to…mrosenquist (70)in cybersecurity • last monthINTERPOL Takes Down a Infostealers OperationCongrats to INTERPOL for taking down a major cyber information-theft infrastructure! Over 20 thousand Ips/domains were shuttered and 41 servers that contained more than 100GB of sensitive data was…mrosenquist (70)in cybersecurity • last monthCycles That Drive CybersecurityThe cybersecurity industry moves fast! The attackers are constantly adapting and relentless in their pursuits that victimize others. New users are being added to the global online ecosystem.…mrosenquist (70)in cybersecurity • last monthCyberattacks Start with People and so Should Risk AssessmentsResource allocation prioritization is essential in cybersecurity. Many leaders struggle in their attempts to defend against every possible risk - which is impossible and inefficient. In my latest…mrosenquist (70)in cybersecurity • last monthWhy Threat Agents Must be Included in Cybersecurity Risk AssessmentsIn the ever-evolving landscape of cybersecurity, organizations face a constant struggle: how to best allocate limited resources to maximize their defensive posture. No one has enough budget…mrosenquist (70)in cybersecurity • last monthOn the Billboard in NY Times SquareThanks again Topmate for putting me on a billboard in New York Times Square! I have enjoyed using the Topmate platform to mentor and provide 1:1 guidance for: Cybersecurity Product/Service…mrosenquist (70)in cybersecurity • last monthBankers Attempt to Undermine Cybersecurity TransparencyThe banking industry makes a shady move in using lobbyists to undermine the SEC 4-day cybersecurity disclosure rule—an essential safeguard for shareholders and potential victims. Their arguments are…mrosenquist (70)in cybersecurity • 2 months agoBankers Association’s attack on cybersecurity transparencyMy article on Help Net Security highlighting how the banking industry is leveraging their powerful lobbying groups to try and undermine the U.S. Securities and Exchange Commission 4-day…mrosenquist (70)in cybersecurity • 2 months agoShameful Lobbying: Bankers Association’s Attack on Cybersecurity TransparencyBanking industry lobbyists are pressuring the SEC to gut the four-day breach disclosure rule — an essential safeguard for shareholders and potential victims. Their arguments are misleading…