Full list and detailed breakdown available on my Substack: https://matthewrosenquist.substack.com/p/top-10-cybersecurity-predictions
Full list and detailed breakdown available on my Substack: https://matthewrosenquist.substack.com/p/top-10-cybersecurity-predictions
When is the right time to hire a CISO? It's a question many organizations face, and the answer isn't one-size-fits-all.
Key factors include regulatory requirements, organizational size, data sensitivity, and risk tolerance. Startups might benefit from
In the realm of cybersecurity, human error accounts for 75% of breaches, yet it’s not just about “stupid humans.” Recent insights reveal that 10% of users contribute to 73% of risk, while over 60% foster vigilance. With the right empowerment, visibil
Microsoft recently introduced a new framework designed to assess the security of AI models. It’s always encouraging to see developers weaving cybersecurity considerations into the design and deployment of emerging, disruptive technologies. Stronger s
The Cybersecurity Vault - episode 49, with guest Bob Zinga. Bob discusses the impending risks of quantum computing undermining data confidentiality.
In this compelling episode, we dive into the challenges of quantum cybersecurity risks and the pivotal
In the ever-evolving landscape of cybersecurity, organizations face a constant struggle: how to best allocate limited resources to maximize their defensive posture. No one has enough budget, personnel, or tools to defend against every conceivable thr
There are many cybersecurity and privacy risks to consider, both from the user and the enterprise, when it comes to Microsoft's new OneDrive feature that will connect their personal OneDrive with their work device!
LinkedIn: https://www.linkedin.com/
The rapid adoption of AI brings cybersecurity concerns. The value of AI systems is predicated on the breadth of access the system possesses to information and systems which contain sensitive data. We must recognize the challenges early, so we can man
A CISO’s world is never just about technology. It’s about governance, risk, and control. Without governance, security becomes a guessing game. Without risk management, threats remain unseen. A 30-
Cybersecurity failures are now business risks that CEOs and Boards must own. The world of business owners, investors, and their representatives are collectively realizing the potentially catastrophic impacts of cybersecurity incidents if not incorpor
The cybersecurity landscape is poised for transformation in 2025. The rapid evolution of technology, coupled with the increasing sophistication of threat actors, presents a future that is both exciting and daunting. In this era of digital intercon
2025 cybersecurity insights with Gary Hayslip! Gary provides his insights to the challenges and opportunities the cybersecurity industry will face in 2025!
In this podcast series we talk with the best experts who share their insights on the most r
The Cybersecurity Vault - episode 41, with guest Dan Lohrmann.
2025 will be an interesting year for the cybersecurity industry! Dan Lohrmann provides his insights to the challenges and opportunities the cybersecurity industry will face in 2025!
In this
The rapidly evolving expectations of cybersecurity are pushing CISOs to adapt and demonstrate greater value to their organizations. This session explores the changing role of the CISO heading into 2025, strategies for managing increasing expectations
The Cybersecurity Vault - episode 39, with guest Ian Thornton-Trump.
China is one of the most aggressive nation states when it comes to cybersecurity. They possess a renown global proficiency in attacking digital networks, harvesting sensitive data,
I was recently asked “What do intelligence reports do? They appear worthless!”
I found the question both funny and ironic. Unfortunately, I had to gently deliver some uncomfortable news.
There is a fundamental difference between intelligence and the ab
Congrats to the Top 50 Global Thought Leaders and Influencers on Risk Management 2024!
Thanks Thinkers360 for the recognition to myself and so many of the hard working colleagues in the cybersecurity industry!
See the full list of profiles here: https
A “Perfect” 10 vulnerability score is not what users of Cisco Ultra-Reliable Wireless Backhaul (URWB) systems were expecting. The recently discovered cybersecurity vulnerability CVE-2024–20418 is remote, easy, and gives full Admin rights to the devi
Ransomware is one of the most devastating challenges in cybersecurity today. The attacks are vicious, expensive, impactful, and becoming commonplace.
Over the years I have predicted its rise, discussed why it is so challenging, debunked myths like bla
The Atlanta Pen Test Chapter has officially begun and is now actively underway.
Atlanta CISOs and security teams have kicked off Pen Test Chapter #1 (Virtual), an ongoing working series focused on drafting Pen Test Maturity Model v0.1, designed for an intel-led, exploit-validated, and AI-assisted security reality. The chapter was announced at …