2025 cybersecurity insights with Gary Hayslip! Gary provides his insights to the challenges and opportunities the cybersecurity industry will face in 2025!
In this podcast series we talk with the best experts who share their insights on the most r
Podcast (107)
The Cybersecurity Vault - episode 41, with guest Dan Lohrmann.
2025 will be an interesting year for the cybersecurity industry! Dan Lohrmann provides his insights to the challenges and opportunities the cybersecurity industry will face in 2025!
In this
The Cybersecurity Vault — episode 40, with guest Sumona Banerji
Attackers are masterful at using Social Engineering techniques to victimize others. They take advantage of vulnerabilities that are deeply rooted in our mental and emotional foundations.
The rapidly evolving expectations of cybersecurity are pushing CISOs to adapt and demonstrate greater value to their organizations. This session explores the changing role of the CISO heading into 2025, strategies for managing increasing expectations
The Cybersecurity Vault - episode 39, with guest Ian Thornton-Trump.
China is one of the most aggressive nation states when it comes to cybersecurity. They possess a renown global proficiency in attacking digital networks, harvesting sensitive data,
The Cybersecurity Vault - episode 38, with guest Evgeniy Kharam.
Soft Skills are essential cybersecurity as they enable communication, teamwork, leadership, and relationship building. Yet, the cybersecurity industry has traditionally focused on the te
I had a great time chatting with the amazing Shira Rubinoff and Rinki Sethi on the Clarity podcast, discussing what people need to know about Cybersecurity and Artificial Intelligence!
The most influential cybersecurity experts discuss adversaries, risks, cyber warfare, and supply chain outages on the Cybersecurity Insights podcast!
Ransomware attacks are vicious, expensive, impactful, and becoming commonplace. So, let’s take a look at what Ransomware is, how attacks typically unfold, and what potential victims can do to improve their risk posture.
Watch the full video here: http
Two Cryptocurrency Exchanges were recently taken down by authorities. The PM2BTC and Cryptex sites were seized.
Video: https://youtube.com/shorts/wvRelrVSOcE
This is important for two reasons:
1. It disrupts illegal money laundering, in this case, hund
I had a great discussion on the SECURITYbreak podcast talking about security vulnerability research impacting Apple vision pro VR headsets, MasterCard’s acquisition of threat intelligence vendor Recorded Future, and some horrific aspects of cybercrim
Conveying the risks and progress for a cybersecurity program to executives is difficult. Over the years, I have explored countless ways to quickly and effectively distill the complexities of cyber risk into a simple graphic that informs management te
The recent CrowdStrike outage provides valuable lessons in how to avoid causing problems and being more resilient when faced with 3rd party vendor issues. CEOs, CIOs, and Board members have a clear responsibility to protect the business and the inve
The Supreme Court struck down the Chevron Doctrine, sharply cutting back the power of federal agencies to interpret the laws they oversee and ruled that courts should rely on their own interpretation of ambiguous laws. The ramifications will have rip
The Cybersecurity Vault - episode #36, with guest Ira Winkler
Today we are going to talk about the massive global IT outage, effecting over 8 million devices, caused by the cybersecurity vendor CrowdStrike. Although not a cyberattack, this incident i
Details emerge on how a bad CrowdStrike update was allowed to land on Windows systems and cause over 8 billion computers to fail.
I discuss their leadership and break down the preliminary Post Incident Review document to reveal the point of failure fo
Let’s break down the CrowdStrike outage in non-technical terms!
Thanks for watching! Be sure to subscribe for more Cybersecurity Insights!
Follow me on LinkedIn: https://www.linkedin.com/in/matthewrosenquist/ and on my YouTube channel for more Cybersec
The recent CrowdStrike outage, that continues to have global implications, reinforces the fact that cybersecurity solutions help manage cyber attack risks, but can also be a source of risk. The level of system access, which is necessary to provide se
As an AT&T customer, I did receive the unwelcome news that they suffered a data breach.
Here is a rundown for what you should to know.
BREACH DETAILS
· This is a sizable data breach of about 109 million customers
· Call and text interactions from May 1,
This is the replay of the live LinkedIn interview with Matthew Rosenquist (CISO at Mercury Risk. - Formerly Intel Corp, Cybersecurity Strategist, Board Advisor, Keynote Speaker) to discuss the Rise of Aggressive Nation State Capabilities. Hosted by A
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
Best Of The World Talks With Anton Chuvakin (Security Advisor at Office of the CISO, Google Cloud)
- Description:
We are hosting an exclusive Best of the World Talks session on "Practical AI In Cybersecurity" featuring Anton Chuvakin (Security Advisor at Office of the CISO, Google Cloud) & David Randleman (Field CISO at FireCompass).…
- Created by: Biswajit Banerjee
16th CISO Platform Top 100 Awards, 2025
- Description:
16th CISO Platform, Top 100 Awards 2025Top 100 Awards is India's 1st & Oldest CISO Awards, happening on February 21st 2025 at Bengaluru, Karanataka, India.
For more details and agenda: Click Here
Nominate Yourself (Last Date 25th Jan 2025):…
- Created by: Biswajit Banerjee