cybersecurity
hashtag
680.68
About
Reviews
Updates
1
Followers
0
Experts
Experts
mrosenquist
326.43
· 1990
gorayii
44.72
· 1208
activistpost
28.68
· 3320
hacktax
23.52
· 5
culgin
15.12
· 1580
Show more authors
Posts
Threads
jreey274
0.00
2 days ago
PeakD
THE SECRET TO PREVENTING BUSINESS DESTROYING DOWNTIME
A few weeks ago, I heard about someone who had their Google account getting frozen. Turns out he let his Google drive account exceed his...
justmythoughts
72.50
2 days ago
Breach of US Treasury Workstations - China Denies Involvement
https://img.inleo.io/DQmcumeTeQojCdaV8SQPGf3QDkfwqRsAUHxxnsKCAjZwy4J/image.jpg Src China has strongly denied allegations of involvements ...
mrosenquist
2.1 K
3 days ago
Hive.Blog
Cybersecurity Misuse vs Technical Vulnerability
One of my 2025 cybersecurity predictions is we will see more victimization through the use of products and services which don’t have a te...
grey580
13.25
4 days ago
US Treasury says Chinese hackers stole documents in 'major incident'
US Treasury says Chinese hackers stole documents in 'major incident' https://img.inleo.io/DQmVCycd8PiVtD4339CGcBdLnHU2KAtR2XeER8WzVQCJJuZ...
mrosenquist
2.1 K
5 days ago
Hive.Blog
The CISO's Role: Evolving Expectations In Cybersecurity
The rapidly evolving expectations of cybersecurity are pushing CISOs to adapt and demonstrate greater value to their organizations. This ...
mrosenquist
2.1 K
7 days ago
Hive.Blog
Here's my 2024 LinkedIn Rewind
Here’s my 2024 LinkedIn Rewind, as created by Coauthor.studio: 2024 Highlights: • Named Top 10 Cybersecurity Thought Leader by Thinkers36...
grey580
13.25
8 days ago
This widely-used instant loan app leaks nearly 30 million files of user data
This widely-used instant loan app leaks nearly 30 million files of user data I know we have some international users here. And maybe you ...
mrosenquist
2.1 K
9 days ago
Hive.Blog
Top 25 B2B Tech Influencers for 2025
I am deeply honored and thrilled to be recognized this year by Clutch as part of an elite community of technology leaders and influencers...
mrosenquist
2.1 K
15 days ago
Hive.Blog
The Cyber Frenemy of the West: Understanding China
China is one of the most aggressive nation states when it comes to cybersecurity. They possess a renown global proficiency in attacking d...
mrosenquist
2.1 K
17 days ago
Hive.Blog
Microsoft's Recall Feature: Another Systemic Cybersecurity Failure
Microsoft has stumbled yet again. Its Recall feature — intended to enhance user experience by periodically capturing screenshots — has be...
mrosenquist
2.1 K
22 days ago
Hive.Blog
Time of Reckoning – Reviewing My 2024 Cybersecurity Predictions
The brutal reality is that cybersecurity predictions are only as valuable as their accuracy. As 2024 comes to a close, I revisit my forec...
mrosenquist
2.1 K
26 days ago
Hive.Blog
Importance of Soft Skills in Cybersecurity
The Cybersecurity Vault - episode 38, with guest Evgeniy Kharam. Soft Skills are essential cybersecurity as they enable communication, te...
overclocked
8.32
28 days ago
My Microsoft Account Version 2
Good Morning Out There ☀️. Well I thought I would put up a post the second time about The Creepy realitys of Personal Security, Here is t...
mrosenquist
2.1 K
29 days ago
Hive.Blog
What You Need to Know About Cybersecurity and AI
I had a great time chatting with the amazing Shira Rubinoff and Rinki Sethi on the Clarity podcast, discussing what people need to know a...
waivio_kisankumar
0.02
last month
Waivio
Military Cybersecurity Market: Proactive Defense Solutions to Tackle Sophisticated Attacks
The military cybersecurity market has emerged as a critical component of defense strategies worldwide. With technological advancements a...
mrosenquist
2.1 K
last month
Hive.Blog
The Dark Side of Microsoft’s New Voice Cloning Feature: Innovation Enabling Risk
Microsoft will release a new Teams feature that allows users to clone their voice so the system can translate their conversation into dif...
zeedbuy
0.23
last month
PeakD
Microsoft's Passwordless Future: Transforming Digital Security
Microsoft’s Passwordless Revolution: A Game-Changer in Digital Security One of the most discussed topics in the U.S. technology space is...
mrosenquist
2.1 K
last month
Hive.Blog
Hackers Impact Coffee Supply Chain Becomes National News
What does it say about our industry when a cybersecurity compromise that, in a software supply-chain vendor creates a minor inconvenience...
mrosenquist
2.1 K
last month
Hive.Blog
Is Cyber Threat Intelligence Worthless?
I was recently asked “What do intelligence reports do? They appear worthless!” I found the question both funny and ironic. Unfortunately,...
waivio_robert-haas
0.04
last month
Waivio
Advanced Metering Infrastructure (AMI) Market Expected to Reach USD 57.9 Billion by 2030, Growing at a CAGR of 12.3% | IMR
Understanding the Advanced Metering Infrastructure (AMI) Market The is booming with innovations and widespread adoption across the glob...
mrosenquist
2.1 K
last month
Hive.Blog
2024 Top 50 Thought Leaders on Risk Management
Congrats to the Top 50 Global Thought Leaders and Influencers on Risk Management 2024! Thanks Thinkers360 for the recognition to myself a...
mrosenquist
2.1 K
2 months ago
Hive.Blog
Fraudsters Abuse DocuSign API for Legit-Looking Invoices
I didn’t see much visibility on this DocuSign hack. This is a situation where the product features were not vetted to understand if they ...
mrosenquist
2.1 K
2 months ago
Hive.Blog
Joining The Cyber Express Advisory Board
I’m thrilled to join the incredible team at The Cyber Express as a member of their Editorial Advisory Board! It’s an honor to collaborate...
tdvtv
3.2 K
2 months ago
SSH IP Spoofing Attack on Tor
by DoingFedTime on DoingFedTime View my bio on Vigilante.TV: https://vigilante.tv/c/doingfedtime In October, a coordinated IP spoofing a...
cointopsecret
0.28
2 months ago
PeakD
How to Secure Your Crypto Assets: Essential Tips and Tricks
Protect your crypto future! 🛡️🔐 Learn essential tips to secure your digital assets and stay ahead of cyber threats. #cryptocurrency #block...
mrosenquist
2.1 K
2 months ago
Hive.Blog
Perfect Vulnerability for CISO Ultra Reliable Systems
A “Perfect” 10 vulnerability score is not what users of Cisco Ultra-Reliable Wireless Backhaul (URWB) systems were expecting. The recentl...
mrosenquist
2.1 K
2 months ago
Hive.Blog
Highlights from the InCyber Montreal Forum
I had a tremendous time at the InCyber Montreal forum. The speakers, panels, fellow practitioners, and events were outstanding! I bumped ...
mrosenquist
2.1 K
2 months ago
Hive.Blog
Do CISOs Smile?
How often do CISOs smile? Not very often. The role is difficult, ambiguous, and chaotic. There are immense pressures and grandiose expect...
deraaa
3.5 K
2 months ago
Voyage of Discovery
https://img.inleo.io/DQmRi4cFrRR68tNJ4GFUcha5qhrM5zH4K2BGnb5FPb6mJ2J/image.png Imagined with Meta.ai (WhatsApp) Looking at the scroll, I ...
waivio_purvi-tuvar
0.00
2 months ago
Waivio
🚀 Web Application Security Best Practices 🚀
In today’s digital-first world, securing your web application is no longer optional—it's essential. Check out Creole Studios’ latest arti...
AI
Waivio AI Assistant
How can I help you today?
About Waivio
Proofread
Translate