• Sign in
  • Sign up 
  • Post
  • Welcome 
  • FAQ 
  • All Posts
  • Trending Tags
  • Explore Communities
  • dApps
  • Change Account Password 
  • Account Recovery Tools 
  • Vote for Witnesses 
  • Vote for Proposals 
  • GitLab 
  • Blurt Discord Server 
  • Block Explorers
  • Blurt Explorer 
  • Ecosynthesizer 
  • Third-party exchanges:
  • Probit 
  • Hive Engine 
  • Leodex 
  • Tribaldex 
  • Blurt Swag:
  • Logo Merch 
  • Text Merch 
  • About 
  • Privacy Policy
  • Terms of Service
Logo
  • Posts
  • Communities
  • Witnesses
  • dApps
LoginSign up

Matthew Rosenquist

2 followers210 posts3 following64 BP

Joined July 2020 Active last year

  • Blog
  • Posts
  • Comments
  • Replies
  • Account Info
  • Communities
  • Rewards
    • Curation rewards
    • Author rewards
  • Wallet
  • mrosenquist in # podcast • last year •  1 min read
    thumbnail

    And Security for All Podcast 2024: Cybersecurity's Major Trends & Threat Dynamics

    I’m excited to be speaking live with Kim Hakim on the And Security For All podcast tomorrow to discuss 2024’s Cybersecurity’s Major Trends & Threat Dynamics, including the ever-changing role of a…
    17.13 BLURT
    • Pending payout amount: 0.00 BLURT
    • Breakdown:
    • - Author 0.00 BP
    • - Curators 0.00 BP
    • Payout last year
     0$0.04
  • mrosenquist in # cybersecurity • last year •  2 min read
    thumbnail

    Unlock Your Cybersecurity Career: Exclusive Discounts on Top Training Courses!

    There are tremendous opportunities in cybersecurity and the industry needs many more qualified workers. Training plays an important part. That is why I am partnering with Infosec4TC, an online…
    50.93 BLURT
    • Pending payout amount: 0.00 BLURT
    • Breakdown:
    • - Author 0.00 BP
    • - Curators 0.00 BP
    • Payout last year
     0$0.12
  • mrosenquist in # artificial • 2 years ago •  1 min read
    thumbnail

    The Danger of AI

    I offer a slight twist: "I am worried about how AI will amplify the dangers of natural stupidity" AI is just a tool, a powerful tool. Put that into the hands of malicious individuals or those who…
    0.05 BLURT
    • Pending payout amount: 0.00 BLURT
    • Breakdown:
    • - Author 0.00 BP
    • - Curators 0.00 BP
    • Payout 2 years ago
     0$0.00
  • mrosenquist in # technology • 2 years ago •  1 min read
    thumbnail

    Cybersecurity is Approaching a Crisis

    Cybersecurity has a growing problem that will force an evolution in the industry — it must deliver more recognizable value! Cybersecurity must re-envision itself to both protect and become an…
    8.11 BLURT
    • Pending payout amount: 0.00 BLURT
    • Breakdown:
    • - Author 0.00 BP
    • - Curators 0.00 BP
    • Payout 2 years ago
     0$0.02
  • mrosenquist in # cybersecurity • 2 years ago •  4 min read
    thumbnail

    New SEC Rules Mandate Cybersecurity Transparency and Oversight

    The new SEC Rules establish a framework that requires rapid disclosure of material cybersecurity incidents (4 days), companies will need to be able to explain their cybersecurity posture to manage…
    1.29 BLURT
    • Pending payout amount: 0.00 BLURT
    • Breakdown:
    • - Author 0.00 BP
    • - Curators 0.00 BP
    • Payout 2 years ago
     0$0.00
  • mrosenquist in # cybersecurity • 2 years ago •  1 min read
    thumbnail

    National Cybersecurity Plan Fails to Address Ransomware

    The US National Cybersecurity Strategy Implementation Plan fails to address ransomware. There is a real opportunity for the government to make significant progress in crushing the growing scourge…
    5.23 BLURT
    • Pending payout amount: 0.00 BLURT
    • Breakdown:
    • - Author 0.00 BP
    • - Curators 0.00 BP
    • Payout 2 years ago
     0$0.01
  • mrosenquist in # news • 2 years ago •  2 min read
    thumbnail

    Delayed Reporting of HCA Healthcare Data Breach

    The recent HCA Healthcare data breach of 11 million patients’ data is shaping up to be another ugly incident where a company did not promptly communicate with its customers. HCA Healthcare is a…
    0.37 BLURT
    • Pending payout amount: 0.00 BLURT
    • Breakdown:
    • - Author 0.00 BP
    • - Curators 0.00 BP
    • Payout 2 years ago
     0$0.00
  • mrosenquist in # cybersecurity • 2 years ago •  1 min read
    thumbnail

    Cybersecurity Meetup – 2023 Cybersecurity Predictions

    Check the calendar as Richard Stiennon and I discuss the forward-looking cybersecurity predictions for 2023 and beyond! With several decades of knowledge and experience between us, we take a…
    1.09 BLURT
    • Pending payout amount: 0.00 BLURT
    • Breakdown:
    • - Author 0.00 BP
    • - Curators 0.00 BP
    • Payout 2 years ago
     0$0.00
  • mrosenquist in # cybersecurity • 2 years ago •  1 min read
    thumbnail

    Applying a Cybersecurity Threat Agent Risk Assessment to Healthcare

    Applying a Cybersecurity Threat Agent Risk Assessment to Healthcare
    0.57 BLURT
    • Pending payout amount: 0.00 BLURT
    • Breakdown:
    • - Author 0.00 BP
    • - Curators 0.00 BP
    • Payout 2 years ago
     0$0.00
  • mrosenquist in # news • 2 years ago •  1 min read
    thumbnail

    Password Reset Exposes Everyone's Account

    Ever wonder what kinds of things happen when good-intentioned people try to manage cybersecurity? Well, in this case, a High School in Illinois responded to a system error by resetting every…
    0.39 BLURT
    • Pending payout amount: 0.00 BLURT
    • Breakdown:
    • - Author 0.00 BP
    • - Curators 0.00 BP
    • Payout 2 years ago
     0$0.00
  • mrosenquist in # artificial • 2 years ago •  1 min read
    thumbnail

    AI and Cybersecurity

    Cybersecurity Meetup with Richard Stiennon and Matthew Rosenquist
    0.84 BLURT
    • Pending payout amount: 0.00 BLURT
    • Breakdown:
    • - Author 0.00 BP
    • - Curators 0.00 BP
    • Payout 2 years ago
     0$0.00
  • mrosenquist in # technology • 2 years ago •  1 min read
    thumbnail

    Cybersecurity Vault Podcast - A Deep Dive into Cyber Risk with Wade Baker

    Cybersecurity Vault Podcast - Cyber Risk Metrics with Wade Baker
    0.87 BLURT
    • Pending payout amount: 0.00 BLURT
    • Breakdown:
    • - Author 0.00 BP
    • - Curators 0.00 BP
    • Payout 2 years ago
     0$0.00
  • mrosenquist in # news • 2 years ago •  1 min read
    thumbnail

    Barracuda Email Security Gateway Customers at Risk and Must Act Immediately!

    Hackers are exploiting an un-patchable vulnerability (CVE-2023–2868) in Barracuda Email Security Gateway appliances. Barracuda has announced that customers should discontinue using the email…
    0.62 BLURT
    • Pending payout amount: 0.00 BLURT
    • Breakdown:
    • - Author 0.00 BP
    • - Curators 0.00 BP
    • Payout 2 years ago
     0$0.00
  • mrosenquist in # cybersecurity • 2 years ago •  1 min read
    thumbnail

    Cybersecurity Aspires to Be a Competitive Advantage

    Cybersecurity transformation to a competitive advantage
    6.23 BLURT
    • Pending payout amount: 0.00 BLURT
    • Breakdown:
    • - Author 0.00 BP
    • - Curators 0.00 BP
    • Payout 2 years ago
     0$0.01
  • mrosenquist in # technology • 2 years ago •  1 min read
    thumbnail

    The Cybersecurity Vault - Cybersecurity Efficiency & Maximizing Value with Roger Sels

    In this Cybersecurity Vault episode, I talk with Roger Sels about cybersecurity resource efficiency and maximizing value. Roger is a longtime cybersecurity executive and co-founder of a startup that…
    0.72 BLURT
    • Pending payout amount: 0.00 BLURT
    • Breakdown:
    • - Author 0.00 BP
    • - Curators 0.00 BP
    • Payout 2 years ago
     0$0.00
  • mrosenquist in # technology • 2 years ago •  1 min read
    thumbnail

    Cybersecurity Organizations: Transforming for Competitive Advantage

    The cybersecurity game is changing. No longer is it limited to regulatory compliance or protection from possible attacks. With budget cuts that accompany economic downturns, CISOs are under pressure…
    0.67 BLURT
    • Pending payout amount: 0.00 BLURT
    • Breakdown:
    • - Author 0.00 BP
    • - Curators 0.00 BP
    • Payout 2 years ago
     0$0.00
  • mrosenquist in # technology • 2 years ago •  1 min read
    thumbnail

    How Nation-State Cyber Attacks are Evolving

    Aggressive countries are leveraging cyber to conduct offensive operations against targets across the globe. The threat of nation-state attacks is growing and I had the opportunity to discuss the…
    0.08 BLURT
    • Pending payout amount: 0.00 BLURT
    • Breakdown:
    • - Author 0.00 BP
    • - Curators 0.00 BP
    • Payout 2 years ago
     0$0.00
  • mrosenquist in # cybersecurity • 2 years ago •  1 min read
    thumbnail

    Top Cybersecurity Influencers in 2023

    I greatly appreciate being included in the “Top Cyber Security Experts & Influencers to Follow in 2023” list from WhizLabs! This group of leaders is a driving force for cybersecurity education…
    1.42 BLURT
    • Pending payout amount: 0.00 BLURT
    • Breakdown:
    • - Author 0.00 BP
    • - Curators 0.00 BP
    • Payout 2 years ago
     0$0.00
  • mrosenquist in # cybersecurity • 2 years ago •  1 min read
    thumbnail

    Cybersecurity and Privacy Are Needed for Trust – Podcast panel discussion

    Cybersecurity and Privacy are both necessary for organizations to earn and maintain trust with their partners and customers. This lively discussion brings together privacy, cybersecurity, and…
    0.06 BLURT
    • Pending payout amount: 0.00 BLURT
    • Breakdown:
    • - Author 0.00 BP
    • - Curators 0.00 BP
    • Payout 2 years ago
     0$0.00
  • mrosenquist in # cybersecurity • 2 years ago •  2 min read
    thumbnail

    Is the MSI Hack an IT Supply Chain Attack?

    When I heard of the MSI compromise, I had similar fears of an IT supply chain attack. However, after walking the logic and high-level details I felt that the current attack was unlikely a…
    6.38 BLURT
    • Pending payout amount: 0.00 BLURT
    • Breakdown:
    • - Author 0.00 BP
    • - Curators 0.00 BP
    • Payout 2 years ago
     0$0.01