Waivio

infosec

hashtag
79.19

Experts

Show more authors

mrosenquist

2.2 K
Hive.Blog

Threat Casting a Nation State Attack on Critical Infrastructure Scenario at CognectCon2025

During exercises at CognectCon2025 a number of cyberattack scenarios were discussed that highlighted the risks of cyber attackers levera...

tdvtv

3.2 K

KeePass vs the Cloud: Why Centralized Password Managers Keep Failing

by DoingFedTime on DoingFedTime View my bio on Vigilante.TV: https://vigilante.tv/c/doingfedtime Cloud-based password managers are faili...

mrosenquist

2.2 K
Hive.Blog

INTERPOL Takes Down a Infostealers Operation

Congrats to INTERPOL for taking down a major cyber information-theft infrastructure! Over 20 thousand Ips/domains were shuttered and 41 s...

tdvtv

3.2 K

Your VPS Provider Can Still Betray You, Monero or Not

by DoingFedTime on DoingFedTime View my bio on Vigilante.TV: https://vigilante.tv/c/doingfedtime Paying for your VPS with Monero doesn’t...

waivio_annie-naz

0.02
Waivio

Cybersecurity Risk Management: Why It’s Critical for Your Business Future

Cybersecurity risk management is now necessary in today's hyperconnected digital environment. Cyber threats have the potential to interru...

mrosenquist

2.2 K
Hive.Blog

Perfect Vulnerability for CISO Ultra Reliable Systems

A “Perfect” 10 vulnerability score is not what users of Cisco Ultra-Reliable Wireless Backhaul (URWB) systems were expecting. The recentl...

tdvtv

3.2 K

"RISAA, die NSA und der TOD IHRER Datenschutzrechte (es sei denn, Sie sind im Kongress!)

by DoingFedTime on DoingFedTime View my bio on Vigilante.TV: https://vigilante.tv/c/doingfedtime ☆-----☆-----☆-----☆-----☆ Description...

peertube1337

0.08

"Russia's Cyber Militia: Investigation and Legal Challenges"

Cybercrime, Investigation, Stroganov Group, Flint, Legal Proceedings, Information Security, Organized Crime, Cybersecurity, Criminal Case...

aagabriel

1.8 K
PeakD

Tools and Techniques for Cognitive Security

CogSec (Cognitive Security) Collaborative 1. Tools and Techniques for Cognitive Security Tools and Techniques for Cognitive Security ...

tdvtv

3.2 K

Uncovering LE Activities: Darknet Vendor OSINT Perspectives - SANS Summit 2023

by DoingFedTime on DoingFedTime View my bio on Vigilante.TV: https://vigilante.tv/c/doingfedtime Welcome to my talk from the SANS Summit...

tdvtv

3.2 K

Darknet's Silent Alarm: The Secret Behind Canary.txt - Deep Dot Darknet

by DoingFedTime on DoingFedTime View my bio on Vigilante.TV: https://vigilante.tv/c/doingfedtime Ever wondered about the origins of 'can...

mrosenquist

2.2 K

National Cybersecurity Plan Fails to Address Ransomware

The US National Cybersecurity Strategy Implementation Plan fails to address ransomware. There is a real opportunity for the government to...

ruldan20

0.37

Taking review of my IT information security upskilling, soon to take my second tim ...

... e security+ certification. https://www.geeksforgeeks.org/what-is-information-security/amp/ #dbuzz #hive #cryptography #infosec https:...

scetrov

0.22
PeakD

Using WAX permissions to create a custom Warsaken claim-only keypair

Within the world of cybersecurity, one of the key controls that we can employ to protect ourselves is Least Privilege; this principle dic...

gray00

20.88
Hive.Blog

[AIGEN] Official OpenAI's GPT4: Warning to All Hive StakeHolders and witnesses. Quantum Blockchain Innovation Stack;Part 2:

Quantum-Resistant Cryptography a. Post-quantum cryptography algorithms Post-quantum cryptography refers to cryptographic algorithms desig...

mrosenquist

2.2 K

Crucial conversations: Overcoming the 5 Areas Where CISOs Tend to Struggle

I had a great conversation with Marco Ciappelli and Sean Martin from ITSPmagazine Podcast discussing the mistakes and hard-learned lesson...

doifeellucky

436.63
PeakD

The Top 5 cyber security breaches of the last 10 year’s

Well folks, it's that time of year again. Time to reflect on the past decade and take a look at the top 5 cybersecurity breaches that ha...

doifeellucky

436.63
PeakD

Lastpass hack, a password manager disaster…

Source ![source Pixabay https://pixabay.com/images/id-2170630/] What a shitshow...

macchiata

857.13
PeakD

Building Minimalist Productivity Setup

A somewhat minimalist approach to technology Recently, I've been sharing a lot about data and OPSEC (Operation Security). In layman term...

macchiata

857.13
PeakD

Do you care about your data?

Data is the new currency. And if a product is free, you are the product; A phrase coined by a world-famous American sculptor and video ...

lukaz364

4.64
Hive.Blog

Cyber security : a necessary tool for modern-day business

Advancement in information and communication technology has adversely affects the operation and process of businesses, education, militar...

mrosenquist1

4.19

Finding the Next SolarWinds Type of Supply Chain Attack

▶️ Watch on 3Speak It is time the industry evolves our collective capability to detect the next SolarWinds type of supply chain attack. ...

mrosenquist1

4.19

Cybersecurity Insights - Criminalizing Ransomware Payments with Malcolm Harkins

▶️ Watch on 3Speak Ransomware is a growing scourge. Is it possible to eradicate this entire class of attacks? I think it is but in tod...

mrosenquist1

4.19

Cybersecurity Insights - Deficient Forethought for Digital Technology Risks with Alexander Stein

▶️ Watch on 3Speak In today’s Cybersecurity Insights podcast, I am talking with Dr. Alexander Stein, an expert in human decision-making ...

mrosenquist

2.2 K

Video Presentation: Why Cybersecurity is Not Fixed Yet

I recently presented to a small group on why cybersecurity is becoming more difficult over time, despite all the money and effort that is...

mrosenquist1

4.19

Why Cybersecurity is Not Fixed Yet

▶️ Watch on 3Speak I recently presented to a small group on why cybersecurity is becoming more difficult over time, despite all the mone...

mrosenquist1

4.19

They Said a CISO Does What?

▶️ Watch on 3Speak The cybersecurity industry had challenges with bringing in new blood and facilitating the career growth. Misinformat...

anthonyadavisii

2.9 K

You think removing wireless radios is enough to protect air-gapped sys ...

You think removing wireless radios is enough to protect air-gapped systems? Think again. #infosec #lantenna #airgap #cybersecurity https:...

natebowie

43.55
Hive.Blog

Various Tech Podcasts I Think You Might Like

As you can probably see from the title, I thought I would share/review some interesting podcasts related to Information Tech/Security an...

macchiata

857.13
PeakD

OSINT TOOLS : Sherlock Your Social Media

In the previous articles I have mentioned some OSINT tools such as 1) PimEyes 2) Maltego. Today, I will share about Sherlock, an OSINT to...