Waivio

cybersecurity

hashtag
421.78

Experts

Show more authors

mrosenquist

958.00
Hive.Blog

Protecting From Cloud Based Attacks - Upcoming Webinar

Cloud attacks are different. Attackers can strike extremely fast using advanced techniques and automation. Is your team prepared to inves...

mrosenquist

958.00
Hive.Blog

Kraken Hacked by Cybersecurity Researchers

When cybersecurity researchers break the law, destroy their reputation, and make the bug-bounty research community look bad. TL:DR Resear...

zerickkricher

0.00

Three Critical Enhancements for Better File Security in Your Company

Introduction: In an era dominated by digital transactions and remote work, ensuring the security of sensitive company files is more cruc...

vennogo5

0.00

Leverage Technology: 5 Tools to Elevate Your Workplace

Introduction: In today's fast-paced business environment, leveraging the right technology can significantly enhance productivity and col...

fhalaaeggit

0.00

5 Essential Strategies to Protect Your Business and Employee Data

In today's digital age, the protection of business and employee data is not just a technical necessity but also a crucial aspect of corp...

keys-defender

997.48
PeakD

Hive App subject to multiple security vulnerabilities

This article is optimized for Desktop browsers and  Peakd Image AI-generated by @karina.gpt in the Crypto Shots server I recently volu...

mrosenquist

958.00
Hive.Blog

Modern CISO Network: A directory of board-ready security leaders

I never imagined I would see my face in the The New York Times! Yet there I am, thanks to Lacework! I am so very honored to be included i...

hypeinsight

0.00

HubSpot Implementation Services For Businesses & Agencies

Supercharge your growth with custom implementation The level of customizability we offer shoots through the roof! That’s how we help you...

lindarey

41.29

Why Protecting My Website is Critical Against a Breach | Glitch #164

▶️ Watch on 3Speak Why Protecting My Website is Critical against a cyber breach. 💥 Find out more about the project and receive long-for...

mrosenquist

958.00
Hive.Blog

Reality of Cybersecurity Risks for AI

The explosive growth of GenAI has serious repercussions for cybersecurity. But is the fear being overplayed in the media? What are the re...

phriendlyphishau

0.02

Privacy and Online Security Myths | Cyber security

Ideally, we all want to keep our data and identities safe online, but there's a lot of confusion about what online privacy means in the ...

tdvtv

3.5 K

BreachForums Getting Hit Again [Breaking News]

by DoingFedTime on DoingFedTime View my bio on Vigilante.TV: https://vigilante.tv/c/doingfedtime In today's video, I'm providing a quick...

mrosenquist

958.00
Hive.Blog

CoinGecko Data Breach

Anyone see that CoinGecko is notifying users of a data breach? Although passwords were NOT exposed, user’s names, emails, IP addresses, a...

mrosenquist

958.00
Hive.Blog

Come join the LIVE discussion: Cybersecurity's Major Trends & Threat Dynamics

Live tomorrow June 7th 2024 on LinkedIn at noon Pacific/2pm CT — Join a brand new Voice America episode of And Security For All! Matthew ...

mrosenquist

958.00
Hive.Blog

Microsoft Recall Cybersecurity & Privacy Risks You Need to Know About!

Microsoft created Recall as a tool to benefit the user, but it has far more value to cybercriminals, hackers, data brokers, digital extor...

chaintuts

8.77
Hive.Blog

Becoming a Phish Fighter - Training to Spot Phishing Scams

Does this corny, MMA themed thumbnail have your attention? Good! I have a great new tutorial for you on fighting...phishing scams that is...

mrosenquist

958.00
Hive.Blog

The Real Value for Operation Endgame Malware Takedown

Operation Endgame has taken down a major cyber criminal infrastructure. This is important, but likely not for the reasons you may think. ...

sub7security

0.12

Digital Safeguards: Unveiling and Protecting Smart Contract Vulnerabilities

Introduction As blockchain technology continues to evolve, smart contracts have become fundamental to the implementation of reliable and...

mrosenquist

958.00
Hive.Blog

50 CISOs & Cybersecurity Leaders Shaping the Future

I am honored and humbled to be listed among such influential luminaries who collectively push our industry to continually adapt to make o...

mrosenquist

958.00
Hive.Blog

Law Enforcement Takes Down Botnet Infrastructure

EUROPOL has struck a blow to the underground botnet community with the largest ever dropper-ecosystem takedown! Over 100 servers that hos...

mrosenquist

958.00
Hive.Blog

The Rise and Risks of Shadow AI

Shadow AI, the internal use of AI tools and services without the enterprise oversight teams expressly knowing about it (ex. IT, legal, cy...

sub7security

0.12

The Real Risks of Inadequate Smart Contract Security

In the rapidly evolving landscape of blockchain technology, smart contracts have emerged as a cornerstone, enabling automated, trustless...

afloid0033

0.00

The Ultimate Guide to Adding Value as an MSP for Your Business Clients

In today’s fast-paced digital world, Managed Service Providers (MSPs) play a crucial role in helping businesses streamline their IT oper...

samuelsemeth

0.00

Ensure Safe Email Marketing with These 9 Tips

Email marketing remains a powerful tool for businesses, enabling direct communication with customers, enhancing brand loyalty, and drivi...

mrosenquist

958.00
Hive.Blog

New Cryptojacking Malware Breakdown

New Cryptojacking Malware Breakdown - The GhostEngine cryptocurrency mining malware disables endpoint security protections, deletes logs,...

zamoranico654

0.01

The Ransomware Shield: Protecting Your Digital Assets

In an increasingly digital world, the protection of your digital assets has never been more critical. Ransomware, a type of malicious so...

mrosenquist

958.00
Hive.Blog

North Korea is Trying to Embed Agents into IT Positions of Western Countries

Attention IT departments, the FBI is warning US companies to be wary of inadvertently hiring North Koreans to remotely work in their IT d...

mrosenquist

958.00
Hive.Blog

Free Cybersecurity Specialist Workshop

A free workshop for students looking to become Cybersecurity Specialists!Also, if you are already a professional and want to explore a ca...

mrosenquist

958.00
Hive.Blog

SEC Will Require Finance to Notify Breach Victims in 30 Days

More SEC rules, this time mandating financial firms inform victims of data breaches within 30 days! Why wasn't this already a requirement...

hive-world

2.9 K

I Was Hacked Twice: Cyber Security A Must To Everyone

Source Hello Friends, how are you doing? Breaching data online is painful than when one physically stole properties from one physically. ...