to learn more about MatthewRosenquist, share content, and exchange messages and invites.
Not a member? Join Now!
to create and rate content, and to follow, bookmark, and share content with other members. Not a member? Join Now!
In the first installment in a series from Semiconductor Engineering, The Next Big Threat declares how security is no longer just a software problem. They are absolutely correct and bring up a number of important... In the digital world, opportunities and risks coexist. To achieve and maintain a balanced Cyber Strategy, implementing a model of "connected security" has become a new imperative in business and society. Managem... Intel Cyber Security Briefing - Trends, Challenges, and Leadership Opportunities - Cyberstrat14Back They got it right. In early 2000, Intel senior management correctly predicted the increase of importance in computer security. The era of cyber was going strong but the combination of a rapidly growing worldwide... Back Cyber security is fraught with chaos, uncertainty and surprises. Insights into the future are a risky proposition, but they can be very valuable in preparing for the challenges ahead. As part of my annual practi... Top 10 Cyber Security Predictions for 2014 and BeyondBack The McKinsey and World Economic Forum report Risk and Responsibility in a Hyperconnected World: Implications for Enterprises looks at the potential consequences of cyber threats to the world’s economy. It... Risk and Responsibility Report Sizes the Importance of CybersecurityBack The estimated growth of devices connected to the Internet is staggering. By 2020 Cisco estimates that 99% of devices (50 billion) will be connected to the Internet. In contrast, currently only around 1% is... Cyber Security is Not Prepared for the Growth of Internet Connected DevicesBack To defeat cyber attacks, we must first understand their characteristics and how they come about. Deconstructing threats is a way of comprehending the factors which drive information security strategy. Without understa... Deconstructing Cyber Security Attacks - Threat ModelBack As an information security strategist for Intel, and a 20-year veteran of the infosec industry, security is my passion. Throughout the week, I come across quite a few interesting articles, or have thoughts about indus... Security Digest: Is Rapid Detection the New Prevention? Are NFC Lamp Posts at Risk? and the Greatest Threat Facing the United StatesBack During the 2013 Intel IT Experts Tour, an audience of IT professionals showed great concern and interest in the challenges of protecting their computing environments from cyber security threats. As part of Intel... Intel IT Experts Tour Security PresentationBack Join me at the Cyberstrat14 security conference in Helsinki on January 22nd. Myself and other keynote speakers and will discuss the challenges and meaningful practices to manage cyber security risks. &nbs... Join Me at the Cyberstrat14 Security Conference in Helsinki, Jan 22ndBack War is a branch-path for governments to achieve political objectives through the influence or application of power. Throughout history, leaders have applied cutting-edge technology in the pursuit of political as... How Cyber War is Different than WarBack Another job well done by the Microsoft Digital Crimes Unit (DCU). My heroes and heroines at the DCU partnered with Europol’s European Cybercrime Centre (EC3), the FBI, and technology industry leaders to ta... Another Win in the Battle Against Botnets!Back Join me at the Cyberstrat13 security conference in Paris on November 26th. I am the keynote speaker and will discuss the challenges and meaningful practices to manage cyber security risks. In the ... Join Me at the Cyberstrat13 Security Conference in Paris, Nov 26thBack The rise in offensive cyber security will cause major shifts in traditional threat and protection strategies. The shift is happening now, as the markets grow, threats increase, players change, and we all are bei... How Offensive Cyber Security is Changing the IndustryBack Enough fluff, smoke, and flash: get to the point. Why have security? At the end of the day, it is all about loss. If you don't like experiencing loss then you must do something to avoid, minimize, or control it... Purpose of Security ProgramsBack Join me at the Cyberstrat13 security conference in Rome on November 21st. I am the keynote speaker and will discuss the challenges and meaningful practices to manage cyber security risks. In the d... Join Me at the Cyberstrat13 Security Conference in Rome, Nov 21stBack Fellow security professionals, come join me at the T.E.N. Cyberstrat13 The Art of Cyber War: Managing Complexity security conference in New York City, September 24th. I will be one of the many speakers discussing chal... Join Me at the Cyberstrat13 Security Conference in NYC Sept 24thBack There are two types of victims: Those with something of value and those who are easy targets. Very soon, those who run Windows XP will fall into the latter category. Those organizations which still cli... Windows XP Support Ends in 2014, Cyber-security Victimization Begins Shortly ThereafterBack After years of avoidance, I have given into Twitter. Fearing the signal-to-noise ratio of valuable communication to worthless blithering, for many years I refused to become a ‘Twit’. But now, a... I Have Become a Security TwitBack Security Professionals Must Communicate with their Peers! Cyber security is hard, pure and simple. Security practitioners must be technical geniuses, brilliant social influencers, crisis response expert... The One Activity Cyber Security Professionals Must DoBack