mrosenquist (70)in #cybersecurity • 2 days agoHumans as a Cybersecurity StrengthDiscover how humans can be a cybersecurity asset, not a liability. Ashley shares insights on empowering people to…mrosenquist (70)in #cybersecurity • 3 days agoRight Time to Hire a CISO?When is the right time to hire a CISO? It's a question many organizations face, and the answer isn't…mrosenquist (70)in #cybersecurity • 4 days agoWhen is the Right Time to Hire a CISO?Knowing when to hire a CISO is a challenging proposition – one which most organizations will eventually need to…mrosenquist (70)in #artificial • 5 days agoArtificial Intelligence Used in 80% of Ransomware AttacksA new report from MIT Sloan cybersecurity research reveals that AI is leveraged in 80% of ransomware attacks. Of the…mrosenquist (70)in #technology • 6 days agoDesigning Tech for HumansExplore the disconnect between technology design and human nature with Sumona's insights. Discover why systems should…mrosenquist (70)in #ai • 8 days agoAnthropic to Pay $1.5 Billion in Copyright LawsuitSteal copyrighted data to train your AI model and pay billions in litigation (and also be required to destroy those…mrosenquist (70)in #life • 9 days agoYou Are ValuableIf you ever feel worthless, don’t fret – know that you are worth $26.73 to Meta. Remember, access to you and your data is their product!mrosenquist (70)in #cybersecurity • 10 days agoUnderstanding Human Error in CybersecurityIn the realm of cybersecurity, human error accounts for 75% of breaches, yet it's not just about "stupid humans."…mrosenquist (70)in #cybersecurity • 12 days agoHuman Based Cybersecurity RisksThe Cybersecurity Vault — episode 48, with guests Wade Baker, Ashley Rose, and Sumona Banerji. Are people the weakest…mrosenquist (70)in #cybersecurity • 17 days agoEntering the Dark Era of AI Powered Cyber AttacksWe are entering the greatest window of opportunity for criminals and malicious actors since the creation of the…mrosenquist (70)in #cybersecurity • 18 days agoMore Browser Extensions Hacked – this time Password ManagersRemember when I said don’t install browser extensions, as they have unimaginable access to your private data and…mrosenquist (70)in #cybersecurity • 19 days agoMicrosoft’s New AI Risk Assessment Framework – A Step ForwardMicrosoft recently introduced a new framework designed to assess the security of AI models. It’s always encouraging to…mrosenquist (70)in #cybersecurity • 20 days agoAI for CybersecurityAI can be a powerful tool for security, allowing us to deploy agents at points of vulnerability. This proactive…mrosenquist (70)in #cybersecurity • 24 days agoRise and Risks of AI in Business LeadershipAre we ready for AI as it evolves to influence or drive business leadership roles? Stuart Evans, a distinguished…mrosenquist (70)in #cybersecurity • 25 days agoDefending Enterprise Data Against Quantum Encryption AttacksThe quantum cliff is coming. Q-Day is the point in time when quantum computers become powerful enough to break most…mrosenquist (70)in #cybersecurity • 26 days agoIntel Internal Data Breach for 270k WorkersHeads-up to my Intel and former Intel colleagues — a data breach has been discovered that exposed information on 270k…mrosenquist (70)in #cybersecurity • last monthLinkedIn Security Tips to Protect from Fraud, Social Engineering, and HackingLinkedIn Security Tips to Protect from Fraud, Social Engineering, and Hacking Stay updated on best #cybersecurity…mrosenquist (70)in #cybersecurity • last monthQuantum Cybersecurity RisksThe Cybersecurity Vault — episode 49, with guest Bob Zinga. Bob discusses the impending risks of quantum computing…mrosenquist (70)in #cybersecurity • last monthTips to Protect Yourself on LinkedIn from Fraud, Social Engineering, and EspionageLinkedIn is a great communication tool for business professionals that informs, provides opportunities, and fosters…mrosenquist (70)in #cybersecurity • last monthTrust and Proving Cybersecurity ValueThe Cybersecurity Vault - episode 49, with guest Bob Zinga. In this episode, we explore the transformative power of…