The most influential cybersecurity experts discuss adversaries, risks, cyber warfare, and supply chain outages on the Cybersecurity Insights podcast!
Ransomware attacks are vicious, expensive, impactful, and becoming commonplace. So, let’s take a look at what Ransomware is, how attacks typically unfold, and what potential victims can do to improve their risk posture.
Watch the full video here: http
Two Cryptocurrency Exchanges were recently taken down by authorities. The PM2BTC and Cryptex sites were seized.
Video: https://youtube.com/shorts/wvRelrVSOcE
This is important for two reasons:
1. It disrupts illegal money laundering, in this case, hund
I had a great discussion on the SECURITYbreak podcast talking about security vulnerability research impacting Apple vision pro VR headsets, MasterCard’s acquisition of threat intelligence vendor Recorded Future, and some horrific aspects of cybercrim
Conveying the risks and progress for a cybersecurity program to executives is difficult. Over the years, I have explored countless ways to quickly and effectively distill the complexities of cyber risk into a simple graphic that informs management te
The recent CrowdStrike outage provides valuable lessons in how to avoid causing problems and being more resilient when faced with 3rd party vendor issues. CEOs, CIOs, and Board members have a clear responsibility to protect the business and the inve
The Supreme Court struck down the Chevron Doctrine, sharply cutting back the power of federal agencies to interpret the laws they oversee and ruled that courts should rely on their own interpretation of ambiguous laws. The ramifications will have rip
The Cybersecurity Vault - episode #36, with guest Ira Winkler
Today we are going to talk about the massive global IT outage, effecting over 8 million devices, caused by the cybersecurity vendor CrowdStrike. Although not a cyberattack, this incident i
Details emerge on how a bad CrowdStrike update was allowed to land on Windows systems and cause over 8 billion computers to fail.
I discuss their leadership and break down the preliminary Post Incident Review document to reveal the point of failure fo
Let’s break down the CrowdStrike outage in non-technical terms!
Thanks for watching! Be sure to subscribe for more Cybersecurity Insights!
Follow me on LinkedIn: https://www.linkedin.com/in/matthewrosenquist/ and on my YouTube channel for more Cybersec
The recent CrowdStrike outage, that continues to have global implications, reinforces the fact that cybersecurity solutions help manage cyber attack risks, but can also be a source of risk. The level of system access, which is necessary to provide se
As an AT&T customer, I did receive the unwelcome news that they suffered a data breach.
Here is a rundown for what you should to know.
· This is a sizable data breach of about 109 million customers
· Call and text interactions from May 1,
This is the replay of the live LinkedIn interview with Matthew Rosenquist (CISO at Mercury Risk. - Formerly Intel Corp, Cybersecurity Strategist, Board Advisor, Keynote Speaker) to discuss the Rise of Aggressive Nation State Capabilities. Hosted by A
Google wants to up-sell enterprise Gmail users for AI security enhancements, when in reality the feature is mitigating the advances that attackers are making through their own innovative use of AI, making their Social Engineering attacks more effecti
The Cybersecurity Vault - episode 35, with guest Mikko Hypponen.
Some of the most aggressive cyber attacks originate out of Russia. The 2022 invasion of Ukraine was a pivotal moment for nation state attacks. Mikko is close to the front lines and on
The Cybersecurity Vault - episode 34, with guest Chase Cunningham.
We take a hard look at when organizations make big cybersecurity mistakes, how the attackers see those as opportunities, and how they will maneuver to take advantage.
Chase’s LinkedIn
As the saying goes “Culture trumps strategy”, which very much holds true when it comes to cybersecurity! Pooja Shimpi, Sameer Gemawat, and I discuss strategies leaders can use to promote a robust security mindset and a security-first approach withi
Live tomorrow June 7th 2024 on LinkedIn at noon Pacific/2pm CT — Join a brand new Voice America episode of And Security For All!
Matthew Rosenquist, CISO and Cybersecurity Strategist at Mercury Risk and Compliance, Inc., will be joining Jonathan Kimmi
Microsoft created Recall as a tool to benefit the user, but it has far more value to cybercriminals, hackers, data brokers, digital extortionists, and malicious insiders!
In today’s video, I discuss the risks and what Microsoft should do to protect us
We are hosting an exclusive "Best of the World" Talks session on "The CISO’s Journey: From Expert to Leader" featuring David B. Cross (SVP & CISO at Oracle), Bikash Barai (Co-founder of CISO Platform & FireCompass) & David Randleman (Field CISO at FireCompass).
The journey from cybersecurity expert to strategic leader is a transformative one for CISOs. This session delves into the stages of a CISO’s evolution, the balance…