Information Security Strategy
Matthew Rosenquist, CISO & cybersecurity Strategist, covers evolving cybersecurity risks and opportunities
Evolving Cybersecurity: Aligning Strategy with Business Growth
The cybersecurity landscape is evolving at an unprecedented pace, driven by rapid technological advancements and increasingly sophisticated cyber threats. What was sufficient yesterday, will be lacking for tomorrow. Organizations must stay ahead ...
Learning from CrowdStrike’s Quality Assurance Failures
Let’s talk about CrowdStrike’s quality assurance failures! Thanks to Help Net Security for publishing my opinion piece. Take a look for a more in-depth explanation of how the bad update made it ...
New Microsoft Recovery Tool for CrowdStrike Issue on Windows Endpoints
Not sure who need this resource, but Microsoft updated its Recovery Tool for the CrowdStrike issue on Windows endpoints: Here is the link to the Microsoft Tech Community Support Site: https://techcommunity.microsoft.com/t5/intune-customer-success/new-recovery-tool-to-help-with-crowdstrike-issue-impacting/ba-p/4196959 As ...
Massive CrowdStrike IT Outage Has Global Implications for Cybersecurity
The world experienced a digital pandemic of systems going offline and displaying the dreaded Windows Blue Screen of Death (BSOD), due to a catastrophic failure caused by a flawed file in an ...
AT&T Data Breach: Understanding the Fallout
As an AT&T customer, I did receive the unwelcome news that they suffered a data breach.Here is a rundown for what you should to know.BREACH DETAILS· This is a sizable data breach ...
Microsoft in Cybersecurity Leadership Crisis – Open Letter to the CEO
There is no indication that the root of Microsoft’s cybersecurity issues is being addressed. In fact, all indications are that the executive team is somewhat worried and bewildered at the diverse and ...
50 CISOs & Cybersecurity Leaders Shaping the Future
I am honored and humbled to be listed among such influential luminaries who collectively push our industry to continually adapt to make our digital ecosystem trustworthy!An incredible list of cybersecurity CISOs and ...
The Rise and Risks of Shadow AI
Shadow AI, the internal use of AI tools and services without the enterprise oversight teams expressly knowing about it (ex. IT, legal, cybersecurity, compliance, and privacy teams, just to name a few), ...
Unlock Your Cybersecurity Career: Exclusive Discounts on Top Training Courses!
There are tremendous opportunities in cybersecurity and the industry needs many more qualified workers. Training plays an important part. That is why I am partnering with Infosec4TC, an online training provider that offers ...
Unlocking SMB Cybersecurity: The Rise of Virtual CISOs in 2024 and Beyond
This year, virtual CISOs must begin making a difference in our industry. For the longest time, small and medium businesses (SMBs) have been abandoned by the cybersecurity industry. But, SMBs need security ...