cybersecurity

hashtag
680.68

Experts

Show more authors

jreey274

0.00
PeakD

THE SECRET TO PREVENTING BUSINESS DESTROYING DOWNTIME

A few weeks ago, I heard about someone who had their Google account getting frozen. Turns out he let his Google drive account exceed his...

justmythoughts

72.50

Breach of US Treasury Workstations - China Denies Involvement

https://img.inleo.io/DQmcumeTeQojCdaV8SQPGf3QDkfwqRsAUHxxnsKCAjZwy4J/image.jpg Src China has strongly denied allegations of involvements ...

mrosenquist

2.1 K
Hive.Blog

Cybersecurity Misuse vs Technical Vulnerability

One of my 2025 cybersecurity predictions is we will see more victimization through the use of products and services which don’t have a te...

grey580

13.25

US Treasury says Chinese hackers stole documents in 'major incident'

US Treasury says Chinese hackers stole documents in 'major incident' https://img.inleo.io/DQmVCycd8PiVtD4339CGcBdLnHU2KAtR2XeER8WzVQCJJuZ...

mrosenquist

2.1 K
Hive.Blog

The CISO's Role: Evolving Expectations In Cybersecurity

The rapidly evolving expectations of cybersecurity are pushing CISOs to adapt and demonstrate greater value to their organizations. This ...

mrosenquist

2.1 K
Hive.Blog

Here's my 2024 LinkedIn Rewind

Here’s my 2024 LinkedIn Rewind, as created by Coauthor.studio: 2024 Highlights: • Named Top 10 Cybersecurity Thought Leader by Thinkers36...

grey580

13.25

This widely-used instant loan app leaks nearly 30 million files of user data

This widely-used instant loan app leaks nearly 30 million files of user data I know we have some international users here. And maybe you ...

mrosenquist

2.1 K
Hive.Blog

Top 25 B2B Tech Influencers for 2025

I am deeply honored and thrilled to be recognized this year by Clutch as part of an elite community of technology leaders and influencers...

mrosenquist

2.1 K
Hive.Blog

The Cyber Frenemy of the West: Understanding China

China is one of the most aggressive nation states when it comes to cybersecurity. They possess a renown global proficiency in attacking d...

mrosenquist

2.1 K
Hive.Blog

Microsoft's Recall Feature: Another Systemic Cybersecurity Failure

Microsoft has stumbled yet again. Its Recall feature — intended to enhance user experience by periodically capturing screenshots — has be...

mrosenquist

2.1 K
Hive.Blog

Time of Reckoning – Reviewing My 2024 Cybersecurity Predictions

The brutal reality is that cybersecurity predictions are only as valuable as their accuracy. As 2024 comes to a close, I revisit my forec...

mrosenquist

2.1 K
Hive.Blog

Importance of Soft Skills in Cybersecurity

The Cybersecurity Vault - episode 38, with guest Evgeniy Kharam. Soft Skills are essential cybersecurity as they enable communication, te...

overclocked

8.32

My Microsoft Account Version 2

Good Morning Out There ☀️. Well I thought I would put up a post the second time about The Creepy realitys of Personal Security, Here is t...

mrosenquist

2.1 K
Hive.Blog

What You Need to Know About Cybersecurity and AI

I had a great time chatting with the amazing Shira Rubinoff and Rinki Sethi on the Clarity podcast, discussing what people need to know a...

waivio_kisankumar

0.02
Waivio

Military Cybersecurity Market: Proactive Defense Solutions to Tackle Sophisticated Attacks

The military cybersecurity market has emerged as a critical component of defense strategies worldwide. With technological advancements a...

mrosenquist

2.1 K
Hive.Blog

The Dark Side of Microsoft’s New Voice Cloning Feature: Innovation Enabling Risk

Microsoft will release a new Teams feature that allows users to clone their voice so the system can translate their conversation into dif...

zeedbuy

0.23
PeakD

Microsoft's Passwordless Future: Transforming Digital Security

Microsoft’s Passwordless Revolution: A Game-Changer in Digital Security One of the most discussed topics in the U.S. technology space is...

mrosenquist

2.1 K
Hive.Blog

Hackers Impact Coffee Supply Chain Becomes National News

What does it say about our industry when a cybersecurity compromise that, in a software supply-chain vendor creates a minor inconvenience...

mrosenquist

2.1 K
Hive.Blog

Is Cyber Threat Intelligence Worthless?

I was recently asked “What do intelligence reports do? They appear worthless!” I found the question both funny and ironic. Unfortunately,...

waivio_robert-haas

0.04
Waivio

Advanced Metering Infrastructure (AMI) Market Expected to Reach USD 57.9 Billion by 2030, Growing at a CAGR of 12.3% | IMR

Understanding the Advanced Metering Infrastructure (AMI) Market The is booming with innovations and widespread adoption across the glob...

mrosenquist

2.1 K
Hive.Blog

2024 Top 50 Thought Leaders on Risk Management

Congrats to the Top 50 Global Thought Leaders and Influencers on Risk Management 2024! Thanks Thinkers360 for the recognition to myself a...

mrosenquist

2.1 K
Hive.Blog

Fraudsters Abuse DocuSign API for Legit-Looking Invoices

I didn’t see much visibility on this DocuSign hack. This is a situation where the product features were not vetted to understand if they ...

mrosenquist

2.1 K
Hive.Blog

Joining The Cyber Express Advisory Board

I’m thrilled to join the incredible team at The Cyber Express as a member of their Editorial Advisory Board! It’s an honor to collaborate...

tdvtv

3.2 K

SSH IP Spoofing Attack on Tor

by DoingFedTime on DoingFedTime View my bio on Vigilante.TV: https://vigilante.tv/c/doingfedtime In October, a coordinated IP spoofing a...

cointopsecret

0.28
PeakD

How to Secure Your Crypto Assets: Essential Tips and Tricks

Protect your crypto future! 🛡️🔐 Learn essential tips to secure your digital assets and stay ahead of cyber threats. #cryptocurrency #block...

mrosenquist

2.1 K
Hive.Blog

Perfect Vulnerability for CISO Ultra Reliable Systems

A “Perfect” 10 vulnerability score is not what users of Cisco Ultra-Reliable Wireless Backhaul (URWB) systems were expecting. The recentl...

mrosenquist

2.1 K
Hive.Blog

Highlights from the InCyber Montreal Forum

I had a tremendous time at the InCyber Montreal forum. The speakers, panels, fellow practitioners, and events were outstanding! I bumped ...

mrosenquist

2.1 K
Hive.Blog

Do CISOs Smile?

How often do CISOs smile? Not very often. The role is difficult, ambiguous, and chaotic. There are immense pressures and grandiose expect...

deraaa

3.5 K

Voyage of Discovery

https://img.inleo.io/DQmRi4cFrRR68tNJ4GFUcha5qhrM5zH4K2BGnb5FPb6mJ2J/image.png Imagined with Meta.ai (WhatsApp) Looking at the scroll, I ...

waivio_purvi-tuvar

0.00
Waivio

🚀 Web Application Security Best Practices 🚀

In today’s digital-first world, securing your web application is no longer optional—it's essential. Check out Creole Studios’ latest arti...
AI
Waivio AI Assistant
How can I help you today?