Social Network For Security Executives: Network, Learn & Collaborate
Added by Matthew Rosenquist on November 26, 2020 at 3:32am — No Comments
We are surrounded! Smart devices are everywhere and being integrated into all facets of our lives, from toothbrushes to automobiles. Entire cities are becoming ‘smart’, as are factories, governments, global retail, freight logistics, and all national critical…Continue
Added by Matthew Rosenquist on November 24, 2020 at 11:11pm — No Comments
In our recent Fireside chat episode in association with FireCompass, between Matthew Rosenquist, CISO Eclipz, and Bikash Barai, Co-Founder, FireCompass, we discussed a bunch of things related to the cybersecurity practices that are gaining momentum and about what the future holds.
Added by Priyanka Aash on November 24, 2020 at 3:00pm — No Comments
Another vulnerability and exploit named VoltPillager has been published for Intel Corporation's SGX security technology. The attack itself is simply a hardware version of a previously discovered PlunderVolt software vulnerability where voltage to the chip was manipulated to undermine SGX…Continue
Added by Matthew Rosenquist on November 20, 2020 at 4:20am — No Comments
A hack is executed every 39 seconds and impacts one in three Americans every year.
Join us in the discussion on Future of Offensive Attack Simulation: Strategies, Tools & Techniques with Bikash Barai and Matthew Rosenquist
Click Here to Join the CISO Platform Fireside Chat:…Continue
Added by Matthew Rosenquist on November 18, 2020 at 12:20pm — No Comments
Criminals are offering stalking services, through the use of Moscow’s camera system, to identify and track people for $200. Customers provide a picture and the criminals will return a report of where that person has been, where they frequent, and more. Apparently, the data is being gleaned from the police facial recognition camera system, that…Continue
Added by Matthew Rosenquist on November 18, 2020 at 2:58am — No Comments
The small country of New Zealand is showing great privacy leadership by releasing a tool to help businesses determine if a cybersecurity incident is considered a Data Breach.
Added by Matthew Rosenquist on November 16, 2020 at 11:46pm — No Comments
I may offend some people, so for those who don’t want to hear my rant, skip this video.
Recent cybersecurity predictions aren’t just wrong, they are dangerous
I am disappointed in the recent comments that Michelle Zatlyn, the co-founder and COO of Cloudflare, made regarding the future of cybersecurity.
Added by Matthew Rosenquist on November 13, 2020 at 1:13am — No Comments
A website tied to an event that quizzed people on their hacking knowledge, launched by major a security consultancy firm, is itself vulnerable to being hacked.
This incident showcases a number of important lessons for every organization that wants to avoid such embarrassment.
If you like these updates, click the Like button…Continue
Added by Matthew Rosenquist on November 11, 2020 at 4:26am — No Comments
Bad news for cryptocurrency criminals!
Cryptocurrency watchers were stunned when they recently saw a billion dollars of Bitcoin being moved from a very old account that has been inactive for years.
The mystery was solved as the U.S. Dept of Justice unsealed court filings…Continue
Added by Matthew Rosenquist on November 9, 2020 at 11:30pm — No Comments
Jack Roehrig, CISO at Turnitin, and I shared insights on how to incorporate Cyber Culture as part of an organization's Cyber Strategy.
Added by Matthew Rosenquist on November 5, 2020 at 10:20am — No Comments
I am happy to see such cooperation across cryptocurrency exchanges to interdict these heinous crimes.
Unfortunately, in addition to the beneficial uses, crypto is also leveraged as a means to support criminal acts…Continue
Added by Matthew Rosenquist on November 5, 2020 at 4:43am — No Comments
FireCompass is conducting a two-day Hands-on workshop on “Shifting from Pentest to Continuous Automated Red Teaming (CART)” @ Best In the world Of Security Summit - 2020
CISO Platform Virtual Conference brings together the best of…Continue
Added by Priyanka Aash on November 4, 2020 at 8:30pm — No Comments
A group of security vulnerability researchers, after many months of work, were able to figure out the update process and secret key used to decrypt Intel microcode updates for the Goldmont architecture product lines.
This is an important finding as it peels back yet another layer of the onion that protects the core CPU from…Continue
Added by Matthew Rosenquist on November 2, 2020 at 10:39pm — No Comments