Waivio

cybersecurity

hashtag
706.11

Experts

Show more authors

mrosenquist

2.2 K
Hive.Blog

Building Ransomware Resilience - Webinar

I am looking forward to a stellar discussion about ransomware! The Official Cybersecurity Summit is coordinating a number of virtual exp...

hangerio

16.83
Hive.Blog

Tactic Tuesday: The One Password Challenge

We need passwords everywhere to login. Are you feeling overwhelm by passwords? You are not alone here. But what if you think about just f...

hangerio

16.83
Hive.Blog

Mythbuster Monday: If It is #1 on Google, It is Safe to Click

We all use google search. It is a daily work we need to visit google and need information. When we search, a number of sites are listed. ...

hangerio

16.83
Hive.Blog

Feature Friday: Your Phone's Lockdown Mode

We all use mobile phones. Some times we need extra security while traveling, using public Wi-Fi or lending our phone to someone briefly. ...

hangerio

16.83
Hive.Blog

Threat Thursday: The Deepfake Scam - When Your Eyes and Ears Can't Be Trusted

A video call from your "CEO" or a voice note from a "Family Member" asking for money? We all communicate each other...

hangerio

16.83
Hive.Blog

Tactic Tuesday: The Link Hove - Your 2 Second Phishing

We all get emails from university, or office or websites. These emails usually contain links. These email looked legitimate, perfect logo...

bhattg

19.9 K

Our Digital Footprints: The Invisible Traces That Can Expose Everything About Us

Nowadays, as technology is increasing, cybercrime is also increasing, and people's thinking is also becoming more and more different beca...

mrosenquist

2.2 K
Hive.Blog

The Rise of AI-Powered Phishing - How to Spot New Attacks

In today’s digital age, cybercriminals are leveraging AI to craft more convincing phishing scams. Recently, I encountered a sophisticated...

mrosenquist

2.2 K
Hive.Blog

Your Social Posts of Your Kids – Is a Danger to Them

Does privacy matter? Yes. Especially for the safety, security, and future of our children. What we innocently post today about our kids c...

mrosenquist

2.2 K
Hive.Blog

The First Malicious MCP Server is a Warning Shot for AI Cybersecurity

The first malicious Model Context Protocol (MCP) server has been discovered and we should all be worried how this is foreshadowing AI cy...

mrosenquist

2.2 K
Hive.Blog

HRMCon 2025 – Human Risk Management Conference

Come find me at the HRMCon 2025 — Age of Adaptive Defense conference in Austin TX (also Virtual) on Monday Oct 20th 2025! I will be in A...

mrosenquist

2.2 K
Hive.Blog

Cybersecurity Concerns as Blockchain Lands in Global Finance

​ The Society for Worldwide Interbank Financial Telecommunication (SWIFT) and over 30 banks servicing 200 countries, have announced they...

mrosenquist

2.2 K
Hive.Blog

China Updates to New Cybersecurity Reporting Rules

China has implemented a 1-hour reporting requirement for severe cybersecurity incidents! First, this is in stark contrast to the disorgan...

alessiashelton

0.09

Business Cybersecurity in Northern Virginia: Threats, Solutions and the Future of Digital Security

In this digital era, cybersecurity has become essential for any kind of business, regardless of its field or size. The cyber-attacks are ...

mrosenquist

2.2 K
Hive.Blog

China’s Preparation for Cyberattacks is a Lesson in Resilience

https://www.youtube.com/embed/2ib83_5oj80 China's approach to rapid incident reporting stands out. With regulations mandating one-hour re...

waivio_techsphoton

0.00
Waivio

TechsPhoton

TechsPhoton is a leading technology blogging website dedicated to delivering the latest tech news, in-depth reviews, how-to guides, and e...

mrosenquist

2.2 K
Hive.Blog

Use AI to Outpace Cyber Defenses

Is your company safe from AI attacks? I had a great conversation with David Mauro on the Cyber Crime Junkies podcast, discussing how AI c...

hangerio

16.83
Hive.Blog

Threat Detection vs. Threat Hunting

We all face the threats in our daily life. What are the real threats to our digital life, we do not know due to lack of awareness. Today,...

mrosenquist

2.2 K
Hive.Blog

China Prepares for Cyberattacks

China has implemented regulations for 1-hour reporting of severe cybersecurity incidents. This would include disruptions that impact over...

mrosenquist

2.2 K
Hive.Blog

Make Security Training Engaging

Uncover the flaws in traditional security awareness training with Sumona’s insights. Learn how to make cybersecurity relevant and engagin...

mrosenquist

2.2 K
Hive.Blog

Silicon Valley C-Level Leadership Summit

I am looking forward to the upcoming HMG Strategy annual Silicon Valley C-Level Leadership Summit on Oct 7th! The summit theme is ENTERP...

hangerio

16.83
Hive.Blog

Mythbuster Monday: "The Padlock Means It's Safe"

The lock on browser does not mean what you think it does. Let's showcase the truth about HTTPS. You have been trained to look for padlo...

jaylatour

567.03
PeakD

Protect Yourself With SurfShark VPN (3 Free Months)

If you want to be safe online then you should be using a VPN. Protecting yourself online is key. If your surfing the web, you’re exposed ...

asimx12

0.11
Hive.Blog

Wireshark - packets from DNS query to TLS 1.2 connection setup

Was going through a packet capture and thought it would be interesting to share an entire connection from the scratch starting with the D...

mrosenquist

2.2 K
Hive.Blog

Balancing Security & Productivity

https://youtube.com/shorts/hX1u30M6X3I Should cybersecurity be oriented to reduce the security friction for savvy workers? Discover how ...

mrosenquist

2.2 K
Hive.Blog

Cybersecurity Careers in the Age of AI: How to Stay Relevant and Resilient

Happy to share that I'll be co-hosting a webinar: Cybersecurity Careers in the Age of AI: How to Stay Relevant and Resilient! The incredi...

mrosenquist

2.2 K
Hive.Blog

Top Thought Leading Cybersecurity Companies in 2025

https://i.postimg.cc/xjLDqRqN/Top-50-Cybersecurity-Companies-2025-1.png We are incredibly honored to have Cybersecurity Insights be named...

mrosenquist

2.2 K
Hive.Blog

Decompose human risk factors

https://youtube.com/shorts/MQzhCM3YrXc](https://youtube.com/shorts/MQzhCM3YrXc Explore the complexities of human risk in cybersecurity wi...

mrosenquist

2.2 K
Hive.Blog

Humans as a Cybersecurity Strength

https://www.youtube.com/embed/vju47bPSrKA" Discover how humans can be a cybersecurity asset, not a liability. Ashley shares insights...

mrosenquist

2.2 K
Hive.Blog

Right Time to Hire a CISO?

https://www.youtube.com/embed/Fv_aIjLHqu0 When is the right time to hire a CISO? It's a question many organizations face, and the answer ...