BlogHide Resteemsmrosenquist (70)in cybersecurity • 2 days agoLet’s Try Positive Reinforcement Cybersecurity TrainingIsn’t it about time the cybersecurity industry shifts towards positive reinforcement cybersecurity training? We must consider that there might be better ways to change cybersecurity behaviors than…mrosenquist (70)in cybersecurity • 4 days agoBankers Association’s Attack on Cybersecurity TransparencyA coalition of banking industry associations, including SIFA, the American Bankers Association (ABA), Bank Policy Institute (BPI), and several other lobbying groups have made a disgraceful appeal to…mrosenquist (70)in cybersecurity • 5 days agoThe Wildest Stage to Talk About CybersecurityI was recently asked what my favorite cybersecurity speaking venue has been. Although not the largest keynote audience by sheer numbers, speaking at the Sphere 2022 conference sticks out as a unique…mrosenquist (70)in cybersecurity • 6 days agoSuccessful Military Attacks are Driving Nation States to Cyber OptionsWith daring military attacks, kinetic warfare is shifting the balance of power in regions across the globe, upending the perception of power projection. Powerful nations are reeling from the impacts…mrosenquist (70)in cybersecurity • 7 days agoThreat Casting a Nation State Attack on Critical Infrastructure Scenario at CognectCon2025During exercises at CognectCon2025 a number of cyberattack scenarios were discussed that highlighted the risks of cyber attackers leveraging cognitive vulnerabilities to cause major impacts to…mrosenquist (70)in cybersecurity • 12 days agoINTERPOL Takes Down a Infostealers OperationCongrats to INTERPOL for taking down a major cyber information-theft infrastructure! Over 20 thousand Ips/domains were shuttered and 41 servers that contained more than 100GB of sensitive data was…mrosenquist (70)in cybersecurity • 12 days agoCycles That Drive CybersecurityThe cybersecurity industry moves fast! The attackers are constantly adapting and relentless in their pursuits that victimize others. New users are being added to the global online ecosystem.…mrosenquist (70)in cybersecurity • 13 days agoCyberattacks Start with People and so Should Risk AssessmentsResource allocation prioritization is essential in cybersecurity. Many leaders struggle in their attempts to defend against every possible risk - which is impossible and inefficient. In my latest…mrosenquist (70)in cybersecurity • 19 days agoWhy Threat Agents Must be Included in Cybersecurity Risk AssessmentsIn the ever-evolving landscape of cybersecurity, organizations face a constant struggle: how to best allocate limited resources to maximize their defensive posture. No one has enough budget…mrosenquist (70)in cybersecurity • 24 days agoOn the Billboard in NY Times SquareThanks again Topmate for putting me on a billboard in New York Times Square! I have enjoyed using the Topmate platform to mentor and provide 1:1 guidance for: Cybersecurity Product/Service…mrosenquist (70)in cybersecurity • 24 days agoBankers Attempt to Undermine Cybersecurity TransparencyThe banking industry makes a shady move in using lobbyists to undermine the SEC 4-day cybersecurity disclosure rule—an essential safeguard for shareholders and potential victims. Their arguments are…mrosenquist (70)in cybersecurity • 26 days agoBankers Association’s attack on cybersecurity transparencyMy article on Help Net Security highlighting how the banking industry is leveraging their powerful lobbying groups to try and undermine the U.S. Securities and Exchange Commission 4-day…mrosenquist (70)in cybersecurity • last monthShameful Lobbying: Bankers Association’s Attack on Cybersecurity TransparencyBanking industry lobbyists are pressuring the SEC to gut the four-day breach disclosure rule — an essential safeguard for shareholders and potential victims. Their arguments are misleading…mrosenquist (70)in cybersecurity • last monthWar & Cyber: 3 Years of Struggle and Lessons for Global SecurityRussia is one of the most aggressive nations when it comes to state coordinated cyberattacks — and Ukraine has been at the center of their crosshairs for 3 years. This report, provided the State…mrosenquist (70)in life • last monthUS Memorial DayMy respect and gratitude to those who chose to fight for something greater than themselves, risking their lives, and sacrificing everything so that my family, friends, community, and the legacy of…mrosenquist (70)in cryptocurrency • last monthCrypto Drainers are Targeting Cryptocurrency UsersAs cryptocurrency becomes more popular and the adoption rises, we see a related increase in the number of cybercrimes, fraud, and malware schemes. Criminals like to hunt and plunder where there is…mrosenquist (70)in cybersecurity • last monthServiceaide Data Breach is Part of a Larger Healthcare TrendAnother big healthcare sector data breach, impacting 480 thousand Catholic Health patients. Their 3rd party vendor Serviceaide is the root cause of this exposure. This is the latest in many…mrosenquist (70)in cybersecurity • last monthCybersecurity Leadership CoachingVery excited to share that I’m now offering cyber security leadership coaching! With over 35 years of experience, I have become an outspoken advocate, mentor, and respected authority in the field…mrosenquist (70)in cryptocurrency • last monthCoinbase Hacked and Turns the Tables on the Cybercriminals!This is how you handle cybercrime digital extortion! Coinbase was compromised by trusted 3rd party partners, which exposed customer data — but customer keys to their assets were still safe. The…mrosenquist (70)in cybersecurity • last monthFear in Cybersecurity MarketingShould fear be prominent in cybersecurity marketing? Listen to what industry experts Jay McBain, Wil Klusovsky, and Ken Yao have to say. I am also honored to be quoted on the discussion: “The…