<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Fri, 03 Apr 2026 18:00:37 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/@mrosenquist/rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[Gmail’s New Rename Feature Could Add Spam and Phishing to Your Inbox]]></title><description><![CDATA[As of March 31st, Google is allowing users to change their primary Gmail address username. Although a nice feature for those who created unfortunate names originally, it may also undermine spam and phishing]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/gmail-s-new-rename-feature-could-add-spam-and-phishing-to-your-inbox</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/gmail-s-new-rename-feature-could-add-spam-and-phishing-to-your-inbox</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Thu, 02 Apr 2026 16:54:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/PB8ro82ZpZP1LwhMpNsM9QB2i14js7msiXzEBSZa8hiozwEkczbgFuZiGX22BJvnRGXbojwa8bA5SbPDZXydkgGmkgiZqdtiFgZmsk3EjhDR9eqF?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cybersecurity Can Learn from the Artemis Launch]]></title><description><![CDATA[The Artemis II mission, bringing humans back to the Moon, had a successful launch today! An amazing cumulation of efforts to manage the mindboggling combination of risks to push a massive rocket into space,]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/cybersecurity-can-learn-from-the-artemis-launch</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/cybersecurity-can-learn-from-the-artemis-launch</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Thu, 02 Apr 2026 00:09:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/6gUbcKN7Uxen6Lzy8s8AoPEQbXTFReURcZStdJH8xQsDgY4s5bzChkhrbdHRiNC1TxG9k2?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Your next user isn't human. Is your app ready?]]></title><description><![CDATA[The rise of agentic AI means that your future users will not be human, but rather their AI-agent proxies. Is your app ready?More insights: Auth0 LinkedIn page:]]></description><link>http://direct.ecency.com/ai/@mrosenquist/your-next-user-isn-t-human-is-your-app-ready</link><guid isPermaLink="true">http://direct.ecency.com/ai/@mrosenquist/your-next-user-isn-t-human-is-your-app-ready</guid><category><![CDATA[ai]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Wed, 01 Apr 2026 16:04:06 GMT</pubDate></item><item><title><![CDATA[RSAC Focuses Cybersecurity Insights, Tech, and Community in One Place]]></title><description><![CDATA[The RSAC conference has once again descended upon San Francisco and delivered an event that brings together the largest collection of industry leaders, technologies, and cybersecurity community events!]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/rsac-focuses-cybersecurity-insights-tech-and-community-in-one-place</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/rsac-focuses-cybersecurity-insights-tech-and-community-in-one-place</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Fri, 27 Mar 2026 19:11:06 GMT</pubDate><enclosure url="https://images.ecency.com/p/BRWJ2YmdUFozvhzfVpSViWN9rFcoyX8nSmkzHW4GadFddvX8?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Turing Award Winners]]></title><description><![CDATA[Congrats to Charles Bennett and Gilles Brassard for winning the Turing Award for their industry leadership and breakthroughs with Quantum Information, specifically quantum key distribution. Their work]]></description><link>http://direct.ecency.com/technology/@mrosenquist/turing-award-winners</link><guid isPermaLink="true">http://direct.ecency.com/technology/@mrosenquist/turing-award-winners</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Fri, 20 Mar 2026 17:59:24 GMT</pubDate></item><item><title><![CDATA[Cybercriminals are Winning with AI]]></title><description><![CDATA[AI has become the most powerful tool for financial fraud since the dawn of the Internet. As predicted, criminals are exploiting it faster, more effectively, and at scale. According to the latest Interpol]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/cybercriminals-are-winning-with-ai</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/cybercriminals-are-winning-with-ai</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Thu, 19 Mar 2026 20:22:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/2YRZBi4FZVHeTcwfbUKKAkzgNpEb5sqPYEFseghMM8yUtjmhhxakzBnCS2eeWyiTzFNbcYwRUyYG2oQdMPiYhFRQ7jMnxkVfocr?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How SMBs Can Proactively Strengthen Cybersecurity]]></title><description><![CDATA[Cyber attackers increasingly target SMBs because they are often the easiest path into larger supply chains. As cyberattacks are ramping up, specifically against Critical Infrastructure sectors, Small and]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/how-smbs-can-proactively-strengthen-cybersecurity</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/how-smbs-can-proactively-strengthen-cybersecurity</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Fri, 13 Mar 2026 18:45:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/2YRZBi4FZVHeTcwfbUKKAkzgNpEb5tkzpuUYw6b8xiNmMXh4WyAgUaEaXzQn1CCTCHdvh3CDYHGVUBJxNDwA3tVW59BGeorPxCn?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Stryker Down!  Iranians Hack the Healthcare Sector Technology Provider]]></title><description><![CDATA[Stryker, a major medical equipment provider for the healthcare sector, has suffered a destructive cyberattack that wiped corporate data and severed employee access, likely from an Iranian sponsored hacking]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/stryker-down-iranians-hack-the-healthcare-sector-technology-provider</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/stryker-down-iranians-hack-the-healthcare-sector-technology-provider</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Wed, 11 Mar 2026 20:00:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/7ohP4GDMGPrULVeHM9ZqC5BaoHUySWRL4EkpJKMEJzjnhmRRBd6jyRUNdDZxbLTnAXLJVTJAC76Nn6DrJ9xHgukvuunTE14jbCoY?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[5 Actions Critical for Cybersecurity Leadership During International Conflicts]]></title><description><![CDATA[The recent military attacks involving Iran in the Middle East are a stark reminder that cybersecurity leadership must continually incorporate geopolitical risk into their enterprise cyber risk posture]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/5-actions-critical-for-cybersecurity-leadership-during-international-conflicts</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/5-actions-critical-for-cybersecurity-leadership-during-international-conflicts</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Fri, 06 Mar 2026 18:25:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/MG5aEqKFcQi7V5gZHA8jzYeU9SHLEYF6skKkJSozmuaxWoHir6gGc97KuTdi5tgt8z8FHtZRViEft8CQWjgGeWvX9FQ1noMSn?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[What to Expect from Iran’s Digital Counterstrike]]></title><description><![CDATA[After the United States and Israel began a bombing campaign on Iran, leading to the decapitation of its political and military leaders, the Middle East has erupted into waves of kinetic warfare. But what]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/what-to-expect-from-iran-s-digital-counterstrike</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/what-to-expect-from-iran-s-digital-counterstrike</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Wed, 04 Mar 2026 22:01:57 GMT</pubDate></item><item><title><![CDATA[Why Cyber Attackers Benefit More from AI Technology than Defenders]]></title><description><![CDATA[AI is transforming both cyber offense and defense, but the attackers hold distinct advantages. AI tools can be used for attacks and defense but the attackers are less concerned with quality or problems.]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/why-cyber-attackers-benefit-more-from-ai-technology-than-defenders</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/why-cyber-attackers-benefit-more-from-ai-technology-than-defenders</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Mon, 02 Mar 2026 21:13:27 GMT</pubDate></item><item><title><![CDATA[The First Crucial Step to Secure AI]]></title><description><![CDATA[Governance of AI is the foundational cornerstone for establishing cybersecurity, privacy, compliance, and safety. Without governance, AI adoption and use becomes the ‘wild west’ where everyone is doing]]></description><link>http://direct.ecency.com/ai/@mrosenquist/the-first-crucial-step-to-secure-ai</link><guid isPermaLink="true">http://direct.ecency.com/ai/@mrosenquist/the-first-crucial-step-to-secure-ai</guid><category><![CDATA[ai]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Fri, 27 Feb 2026 20:25:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eR97q8e5fohQHVxSExfm3az1XbDGdWHuEpn?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[AI Shocks the Cybersecurity Market]]></title><description><![CDATA[The cybersecurity market was jolted last week after Anthropic dropped a bombshell announcement. The company’s new AI Claude model identified 500 previously unknown high-risk vulnerabilities hidden in widely]]></description><link>http://direct.ecency.com/ai/@mrosenquist/ai-shocks-the-cybersecurity-market</link><guid isPermaLink="true">http://direct.ecency.com/ai/@mrosenquist/ai-shocks-the-cybersecurity-market</guid><category><![CDATA[ai]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Wed, 25 Feb 2026 23:43:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/EfcLDDAkyqgqyc52TdHnx88BjGJXpnzxmEnB8yNLCo37xWGfMtGtRsLqSfLAmYJTvywumjJbvLPbuHBiugh1K36qZ6Tb4?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[The Top AI Problem for CISOs]]></title><description><![CDATA[Cybersecurity leadership is faced with an impossible dilemma: either embrace AI and suffer the enormous risks or resist AI and be ostracized by executive leadership for inhibiting gains. ​ The solution]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/the-top-ai-problem-for-cisos</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/the-top-ai-problem-for-cisos</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Tue, 24 Feb 2026 19:29:21 GMT</pubDate></item><item><title><![CDATA[AI Exploiting Vulnerabilities]]></title><description><![CDATA[​ AI tools are transforming the discovery of software vulnerabilities! The recent Anthropic announcement showcases the capabilities, finding over 500 high-severity vulnerabilities that evaded traditional]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/ai-exploiting-vulnerabilities</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/ai-exploiting-vulnerabilities</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Mon, 23 Feb 2026 21:20:33 GMT</pubDate></item><item><title><![CDATA[AI Dominates Cybersecurity]]></title><description><![CDATA[​ AI will dominate the course of cybersecurity in 2026! Attacker's capabilities, growth of vulnerabilities among victims, defender's technology, and the strategic management by CISOs are all radically]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/ai-dominates-cybersecurity</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/ai-dominates-cybersecurity</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Sun, 22 Feb 2026 22:48:06 GMT</pubDate></item><item><title><![CDATA[A Busy Week for Cybersecurity Speaking Engagements]]></title><description><![CDATA[I have a busy week with podcasts, webinars, and a keynote! Communicating and sharing is vital to the cybersecurity industry. It is how we leverage shared knowledge and experiences to make more informed]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/a-busy-week-for-cybersecurity-speaking-engagements</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/a-busy-week-for-cybersecurity-speaking-engagements</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Thu, 19 Feb 2026 01:42:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/8hHVpauQQYxe1XRgmBVcaxhzdz742SYS7LK3mDjmpKW67tkj3RCRcKmbF74?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Open Webinar – Cybersecurity Challenges for 2026]]></title><description><![CDATA[I am giving a keynote about the emerging cybersecurity challenges for 2026 to the Nemertes community and everyone is welcome! Wed Feb 18th, 5 PM ET. This private community of technology luminaries has]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/open-webinar-cybersecurity-challenges-for-2026</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/open-webinar-cybersecurity-challenges-for-2026</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Sat, 14 Feb 2026 18:57:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/5bEGgqZEHBMeGRd9g1Ftt6p1G41Xe1PtRDk9z8PNtxrT9znBHDDXKrVFeEAHxb7gMsw2YpnbQ74iDF7kCFpiMjqgLoTrZu4R?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[2026 Cybersecurity Predictions and Impacts on Human Risk]]></title><description><![CDATA[Be sure to join the amazing Ashley Rose, CEO of Living Security, as we discuss how cybersecurity will impact human risk in 2026, live on Tues Feb 17th at noon Pacific time. 2026 Topics: AI supercharging]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/2026-cybersecurity-predictions-and-impacts-on-human-risk</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/2026-cybersecurity-predictions-and-impacts-on-human-risk</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Fri, 13 Feb 2026 19:53:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/23KQwnti57stwhUDqiHyAK5m1h71bfXeWf8GQPXkPkZ3ThTUwZrV3S8QsvrWntQXJ5NxjBXAWAZejivjwQLnXULhaVqX2yc?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Securing Agentic AI Connectivity]]></title><description><![CDATA[Securing Agentic AI Connectivity AI agents are no longer theoretical, they are here, powerful, and being connected to business systems in ways that introduce cybersecurity risks! They’re calling APIs,]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/securing-agentic-ai-connectivity</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/securing-agentic-ai-connectivity</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Thu, 12 Feb 2026 22:50:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/EfcLDDAkyqgqyc52TdHnx88BjGJXpnzxmEnB8yNLCo37xWGfMtGtRsLqSfPmZL68pmh3erjMreXwNT4YENdo6xK4e8mTC?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>