to learn more about MatthewRosenquist, share content, and exchange messages and invites.
Not a member? Join Now!
to create and rate content, and to follow, bookmark, and share content with other members. Not a member? Join Now!
It is official folks, Cyber-Security is now the fifth warfare domain, after land, sea, air, and space. It now joins the ranks for which the military must understand and plan for offensive and defensive strategie... Cyber-Security: The Fifth Domain of WarfareBack Bring Your Own Devices (BYOD) continues to gain momentum as users bring devices into work environments by the droves. Enterprises must make tricky security decisions to balance the tradeoffs of costs, user produ... Enterprises Security Choices and Tradeoffs for BYODBack Fellow security professionals, come join me at the Intel IT Center Experts tour in Folsom CA, June 13th 2013. I will be one of the many speakers discussing challenges and experiences gained by Intel's IT organiz... Join me at the Intel IT Center Experts Tour in Folsom CA on June 13th 2013Back Even a 10 year old little girl can prove this fact: A 10-year-old girl thwarted an abduction attempt after asking a stranger for a code word that he did not know. A man approached a 10 year old girl outside a p... Security Does Not Need to be Complex to be EffectiveBack Security is about preventing loss. But be careful, as instituting poor security policies can drive away customers and impact your business. This is a story of how a financial institution is doing securit... Poor Security Policies Lead to Disastrous Customer ServiceBack It has been an exciting and eventful year in the world of computer and information security. As I look back through the stack of articles, conference notes, political and regulatory wrangling, technology winners... Top 10 Security Predictions for 2013 and BeyondBack A number of high profile takedowns, arrests, and prosecutions have occurred throughout the year. As I predicted for 2012, we have witnessed a tremendous amount of pressure towards the people behind computer atta... 2012 Crackdown on Hackers and Cyber CriminalsBack Communication is incredibly important in the security industry. We must work together, be it small teams, across organizations, or beyond boarders throughout the industry, government, supporting ecosystem and ac... The confounding world of information security terms, from Access to Zone of ControlBack Recent stories in the news imply Anti-Virus (AV) is dead. A longtime staple of security managers and consumers, AV and more broadly, anti-malware products are a pillar of the security industry. Could all o... Hunter teams are emerging as a new tool in the world of cyber defense. Computer security continues to improve and evolve of overtime. One of the latest practices gaining momentum is the use of cyber securi... Cyber security Hunter teams are the next advancement in network defenseBack Every year, McAfee hosts the FOCUS security conference to pull together its customers, partners, and industry leaders. The conference informs and educates attendees on the latest threats, trends, best-known-meth... McAfee 2012 FOCUS security conference is a successBack Marketing security to consumers is a difficult prospect. Security is not normally something a consumer thinks about, without a good reason. When walking into a store, full of anticipation of purchasing a n... 4 Tips to Successfully Market Security to ConsumersBack Professional malware is a powerful tool and is now being leveraged as a means of psychological warfare against nation-state targets. Recently, operators in Iranian nuclear facilities experienced a not-so-subtle ... Professional Malware is Evolving to Include Psychological WarfareBack I have compiled a collection of the most common questions asked regarding the Threat Agent Risk Assessment (TARA) methodology. Top 10 Questions for the Threat Agent Risk Assessment (TARA) methodologyWhat is the purpos... Top 10 Questions for the Threat Agent Risk Assessment (TARA) methodologyBack Daniel Geer and Bob Blakely recently published a security metrics paper asking the question "Are you smarter than the TSA? (Hint: No)". The paper takes a position the value (aka 'smarts') of the TSA is based upo... Measuring the security 'smarts' of the TSABack The Intel IT employee newsletter, sat down with Matthew Rosenquist, an IT information security strategist who recently reached the midway point of his 6-month rotation working with Intel PC security products team focu... Interview with Matthew Rosenquist, rotation into Intel’s security strategic planningBack Mobile devices are important in our daily lives, but become outright treasured companions when we travel. Losing your device while away from home is frustrating and can define a trip as memorably horrible. ... Tips to Protecting Your Mobile Devices While Travelling on VacationBack Years ago, signing code with a digital signature and certificates was an ironclad way to insure confidence in software and websites. It instilled trust that code and internet properties were legitimately f... Digital Signatures and Certificates No Longer Represent the Security Nirvana of TrustBack Cyber security organizations can benefit from the rich historical lessons and gained insights of the medical industry. The medical community has evolved to manage risks similar to those in the computer security ... Cyber Security: The Doctor Will See You NowBack Healthcare organizations have some of the toughest problems of any industry when it comes to securing their computing environments. They must meet strong regulations, secure massive amounts of data, deal with ma... Healthcare security is a difficult prospect, better risk assessments can helpBack