to learn more about MatthewRosenquist, share content, and exchange messages and invites.
Not a member? Join Now!
to create and rate content, and to follow, bookmark, and share content with other members. Not a member? Join Now!
Can you use ONE WORD to describe the biggest challenge facing information security today? I was asked this very question this morning. After a few minutes of pondering the vast possibilities with coffee in ha... One Word to Describe the Biggest Challenge of Information Security?Back This is for the tireless enterprise security folks out there, working every day to protect the computing environment. Do you feel you are making progress in climbing the mountain towards security nirvana or just... Can Information Security Prevail?Back Sometimes it takes the absurd to realize common sense has left the building. I saw this today while wandering the halls of the office and had to take a picture. Here is an example of a security contro... What's wrong with this security picture?Back According to a study and blog by Enterprise Strategy Group, over half the organizations surveyed will increase their security budgets in 2012. Spending more does not equate to spending smarter. ... IT security will spend more in 2012, but will they spend smarter?Back Looking past the $3.4 billion stolen in 2011 from online revenues, reported by CyberSource, the numbers show real success for computer and information security practices. Online revenue growth outpaced the incre... Bullish on Online Fraud SecurityBack It is that time again when security professionals dust off their crystal ball and predict what the next year will hold for security. Looking in the past, I have mostly agreed with what my peers have foreseen, an... Security Predictions for 2012 and BeyondBack Security can be an emotional topic, especially if you have been victim or sit on the front lines of the battle as either the attacker or defender. Discussions can be wrought with moral implications of right and ... Is Security Spending a Necessary Evil?Back A recent security survey indicated half of those surveyed, have a documented cyber security strategy. I don't believe it! More specifically, I don’t believe the organizations with a 'documented str... 5 Questions to Prove a Cyber Security StrategyBack Intel’s internal employee NewsWire interviewed Matthew Rosenquist, an IT information security strategist who recently completed a six-month rotation working in the security product side of the Intel Architecture... Interview with Matthew Rosenquist, Rotation into Intel’s Security Strategic Planning Comes to a ConclusionBack DARPA, the Defense Advanced Research Projects Agency, and its Department of Defense partners, reached into the private sector this week in an unprecedented way through the first Cyber Colloquium, in search of talent a... DARPA Cyber Colloquium 2011 - Time for OffenseBack It is official folks, Cyber-Security is now the fifth warfare domain, after land, sea, air, and space. It now joins the ranks for which the military must understand and plan for offensive and defensive strategie... Cyber-Security: The Fifth Domain of WarfareBack Winning over the hearts and minds of employees is pivotal in the battle for information security. They can be the greatest threat or the most powerful asset in the fight to keep a company's business secure. ... Winning the Hearts and Minds of Employees on SecurityBack Security is a tough sell. Plain and simple. Nobody really wants security. It is necessary when we feel threatened or under attack, but it can be inconvenient, costly, and adversely affect producti... Back "Measure what is measurable and make measurable what is not" - Galileo Galilei Industry Consortium for Advancement of Security on the Internet (ICASI) has released a framework for the standardization of comput... Security industry can now measure vulnerabilities consistentlyBack In a recent Dark Reading article, a number of experts gave their perspectives on where the focus should be in order to prioritize security effort. Focusing on attacks and not vulnerabilities can help companies prior... Attacks, Threat Agents, and Vulnerabilities are the Key to Prioritizing SecurityBack We have come so far in understanding, measuring, and communicating basic information security factors. Yet, the challenge continues as a recent news story shows. A police chief assured the community that d... Sometimes Information Security Does Not ResonateBack As I crawl closer to the 100 blog mark, I wanted to visually understand the word frequency of topics I have discussed Thanks to the cool applet at wordle.net generated the following word frequency dat... Security Blogging Data VisualizationBack In a progressive leap forward, the US Justice Department has received approval to take control of a seized botnet command structure with the purpose of sending instructions to undermine the infection at the client.&nb... US government Takes Aggressive Steps to Stop BotnetsBack Great news from the Microsoft Digital Crimes Unit (DCU). They, in cooperation with US federal authorities, took down the Rustock botnet. Rustock was one of the most prolific spam engines, specializing in t... The Good Guys Win a Battle Against Botnets!Back There is a race for the security of our computers. It has been going on for years. Attackers, who seek to compromise systems and the defenders who struggle to protect them, are all heading toward the same ... Securing the Computer - Race to the CoreBack