mrosenquist (70)in #cybersecurity • 2 days agoHow SMBs Can Proactively Strengthen CybersecurityCyber attackers increasingly target SMBs because they are often the easiest path into larger supply chains. As…mrosenquist (70)in #cybersecurity • 4 days agoStryker Down! Iranians Hack the Healthcare Sector Technology ProviderStryker, a major medical equipment provider for the healthcare sector, has suffered a destructive cyberattack that…mrosenquist (70)in #cybersecurity • 9 days ago5 Actions Critical for Cybersecurity Leadership During International ConflictsThe recent military attacks involving Iran in the Middle East are a stark reminder that cybersecurity leadership must…mrosenquist (70)in #cybersecurity • 11 days agoWhat to Expect from Iran’s Digital CounterstrikeAfter the United States and Israel began a bombing campaign on Iran, leading to the decapitation of its political and…mrosenquist (70)in #cybersecurity • 13 days agoWhy Cyber Attackers Benefit More from AI Technology than DefendersAI is transforming both cyber offense and defense, but the attackers hold distinct advantages. AI tools can be used…mrosenquist (70)in #ai • 16 days agoThe First Crucial Step to Secure AIGovernance of AI is the foundational cornerstone for establishing cybersecurity, privacy, compliance, and safety.…mrosenquist (70)in #ai • 18 days agoAI Shocks the Cybersecurity MarketThe cybersecurity market was jolted last week after Anthropic dropped a bombshell announcement. The company’s new AI…mrosenquist (70)in #cybersecurity • 19 days agoThe Top AI Problem for CISOsCybersecurity leadership is faced with an impossible dilemma: either embrace AI and suffer the enormous risks or…mrosenquist (70)in #cybersecurity • 20 days agoAI Exploiting VulnerabilitiesAI tools are transforming the discovery of software vulnerabilities! The recent Anthropic announcement showcases the…mrosenquist (70)in #cybersecurity • 21 days agoAI Dominates CybersecurityAI will dominate the course of cybersecurity in 2026! Attacker's capabilities, growth of vulnerabilities among…mrosenquist (70)in #cybersecurity • 24 days agoA Busy Week for Cybersecurity Speaking EngagementsI have a busy week with podcasts, webinars, and a keynote! Communicating and sharing is vital to the cybersecurity…mrosenquist (70)in #cybersecurity • 29 days agoOpen Webinar – Cybersecurity Challenges for 2026I am giving a keynote about the emerging cybersecurity challenges for 2026 to the Nemertes community and everyone is…mrosenquist (70)in #cybersecurity • last month2026 Cybersecurity Predictions and Impacts on Human RiskBe sure to join the amazing Ashley Rose, CEO of Living Security, as we discuss how cybersecurity will impact human…mrosenquist (70)in #cybersecurity • last monthSecuring Agentic AI ConnectivitySecuring Agentic AI Connectivity AI agents are no longer theoretical, they are here, powerful, and being connected to…mrosenquist (70)in #cybersecurity • last monthCybersecurity in the Age of AI – Keynote to the Nemertes CommunityI am really excited to talk about how AI is going to turn cybersecurity upside down in 2026 with the Nemertes…mrosenquist (70)in #cybersecurity • last monthRussia Ramps Up Attacks on Critical InfrastructuresThe recent attack against the Polish power grid has been attributed to ELECTRUM, a Russian state-sponsored cyber…mrosenquist (70)in #cybersecurity • last monthTop Trustworthy Cybersecurity Partners and Service ProvidersFinding trustworthy cybersecurity partners and services is challenging! That is why I am partnering with Clutch and…mrosenquist (70)in #ai • last monthFirefox Will Feature an AI Kill-SwitchI really hope this catches on! Firefox is making a bold move to include an easy option to block AI enhancements in…mrosenquist (70)in #cybersecurity • last monthWhat it Looks like When Cybersecurity Leadership FailsA great example of how uninformed leaders (in this case of cybersecurity) who does not understand the assignment and…mrosenquist (70)in #privacy • last monthData Privacy Week 2026 - Insights from Global Privacy LeadersIn 2026, your data is either your greatest asset or your biggest legal debt. There is no middle ground. Technology is…