Let’s talk about CrowdStrike’s quality assurance failures! Thanks to Help Net Security for publishing my opinion piece. Take a look for a more in-depth explanation of how the bad update made it to over 8 million devices and caused widespread global…
Let’s break down the CrowdStrike outage in non-technical terms!Thanks for watching! Be sure to subscribe for more Cybersecurity Insights!Follow me on LinkedIn: https://www.linkedin.com/in/matthewrosenquist/ and on my YouTube channel for more…
This is the replay of the live LinkedIn interview with Matthew Rosenquist (CISO at Mercury Risk. - Formerly Intel Corp, Cybersecurity Strategist, Board Advisor, Keynote Speaker) to discuss the Rise of Aggressive Nation State Capabilities. Hosted by…
Google wants to up-sell enterprise Gmail users for AI security enhancements, when in reality the feature is mitigating the advances that attackers are making through their own innovative use of AI, making their Social Engineering attacks more…
There is no indication that the root of Microsoft’s cybersecurity issues is being addressed. In fact, all indications are that the executive team is somewhat worried and bewildered at the diverse and numerous issues arising. After many embarrassing…
YouTube has announced that it will facilitate requests to remove AI generated content that is created to look or sound like you.It is a nice gesture on behalf of YouTube, but the process to protect from deepfakes is not scalable. The attackers will…
The Cybersecurity Vault - episode 35, with guest Mikko Hypponen. Some of the most aggressive cyber attacks originate out of Russia. The 2022 invasion of Ukraine was a pivotal moment for nation state attacks. Mikko is close to the front lines and…
The Cybersecurity Vault - episode 34, with guest Chase Cunningham.We take a hard look at when organizations make big cybersecurity mistakes, how the attackers see those as opportunities, and how they will maneuver to take advantage. Chase’s LinkedIn…
As the saying goes “Culture trumps strategy”, which very much holds true when it comes to cybersecurity! Pooja Shimpi, Sameer Gemawat, and I discuss strategies leaders can use to promote a robust security mindset and a security-first approach…
When cybersecurity researchers break the law, destroy their reputation, and make the bug-bounty research community look bad.TL:DR Researchers found a vulnerability in a cryptocurrency exchange. They notified the company, but then exploited the bug…
The explosive growth of GenAI has serious repercussions for cybersecurity. But is the fear being overplayed in the media? What are the realistic risks and what should security and business leaders be doing to protect their organization.In this…