Information Security Strategy
Matthew Rosenquist, CISO & cybersecurity Strategist, covers evolving cybersecurity risks and opportunities

Is Cyber Threat Intelligence Worthless?
I was recently asked “What do intelligence reports do? They appear worthless!” I found the question both funny and ironic. Unfortunately, I had to gently deliver some uncomfortable news. There is ...

Fraudsters Abuse DocuSign API for Legit-Looking Invoices
I didn’t see much visibility on this DocuSign hack. This is a situation where the product features were not vetted to understand if they could be misused by malicious fraudsters. There is ...

Highlights from the InCyber Montreal Forum
I had a tremendous time at the InCyber Montreal forum. The speakers, panels, fellow practitioners, and events were outstanding!I bumped into Dan Lohrmann and Nancy Rainosek before their panel with Sue McCauley ...

SEC is Not Accepting Half-Truths
The SEC has fined four major companies for materially misleading investors regarding cyberattacks.Tech in TroubleRegulatory actions have been brought against Unisys, Avaya, Check Point, and Mimecast for their purposeful decisions to not clearly ...

Are Leaders Ready to Break the Ransomware Cycle
It is good to see US government leaders realize that ransomware is a growing existential threat to our country, at the hands of our adversaries. A top US national cybersecurity advisor ...

InCyber Forum Canada 2024
The InCyber Forum Canada 2024 conference is an outstanding event, packed with multiple stages, many thought-leadership panels, and an expansive array of vendors showcasing their latest innovation.Come join me in Montreal Canada, ...

Locked In – The Cybersecurity Event of the Year
This is how to redefine CISO events! I had a spectacular time at the “Locked In — The Cybersecurity Event of the Year!” Organized by Rinki Sethi and Lucas Moody, it was nothing short ...

Frustration Trying to Opt-Out After the National Public Data Breach
The National Public Data breach has been a nightmare, exposing names, addresses, birthdates, emails, phone numbers, and Social Security Numbers of countless individuals — including mine.As a California resident, I have the legal right ...

FBI Warns of North Korea Attacks Against the Crypto Industry
The decentralized finance (DeFi) and cryptocurrency industries are being targeted by North Korean social engineering schemes in highly personalized and convincing ways. Here is an example that the FBI is showcasing: ...

Evolving Cybersecurity: Aligning Strategy with Business Growth
The cybersecurity landscape is evolving at an unprecedented pace, driven by rapid technological advancements and increasingly sophisticated cyber threats. What was sufficient yesterday, will be lacking for tomorrow. Organizations must stay ahead ...