Clickability tracking pixel

Dan Lohrmann

Chief Security Officer & Chief Strategist at Security Mentor Inc.

Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker and author.

During his distinguished career, he has served global organizations in the public and private sectors in a variety of executive leadership capacities, receiving numerous national awards including: CSO of the Year, Public Official of the Year and Computerworld Premier 100 IT Leader.
Lohrmann led Michigan government’s cybersecurity and technology infrastructure teams from May 2002 to August 2014, including enterprisewide Chief Security Officer (CSO), Chief Technology Officer (CTO) and Chief Information Security Officer (CISO) roles in Michigan.

He currently serves as the Chief Security Officer (CSO) and Chief Strategist for Security Mentor Inc. He is leading the development and implementation of Security Mentor’s industry-leading cyber training, consulting and workshops for end users, managers and executives in the public and private sectors. He has advised senior leaders at the White House, National Governors Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, Fortune 500 companies, small businesses and nonprofit institutions.

He has more than 30 years of experience in the computer industry, beginning his career with the National Security Agency. He worked for three years in England as a senior network engineer for Lockheed Martin (formerly Loral Aerospace) and for four years as a technical director for ManTech International in a US/UK military facility.

Lohrmann is the author of two books: Virtual Integrity: Faithfully Navigating the Brave New Web and BYOD for You: The Guide to Bring Your Own Device to Work. He has been a keynote speaker at global security and technology conferences from South Africa to Dubai and from Washington, D.C., to Moscow.

He holds a master's degree in computer science (CS) from Johns Hopkins University in Baltimore, and a bachelor's degree in CS from Valparaiso University in Indiana.

Follow Lohrmann on Twitter at: @govcso

April 10, 2021

Three Years In: An Update on the Georgia Cyber Center

Georgia CTO Steve Nichols and CISO David Allen discuss what’s new and what’s coming soon at the Georgia Cyber Center, a global resource for cybersecurity training, leadership and more.

April 3, 2021

NIST Releases Draft Guidance on Election Cybersecurity

The National Institute of Standards and Technology (NIST) has released draft guidelines to help local election officials prepare for and respond to cyber threats that could affect elections.

March 27, 2021

Should Technology Product Training Be Free?

What are the pros and cons of free technology and cybersecurity product training? How far should vendors go to make sure your staff become experts?

March 20, 2021

Vaccine Passports: Who, What, When, Where and How?

The whole world is talking about COVID-19 vaccines, and the travel and hospitality industries are abuzz over potential vaccine passports. But people, process and technology questions abound.

March 13, 2021

Cyber Attacks: Is the ‘Big One’ Coming Soon?

In the past 90 days, the world has witnessed a serious escalation in cyberattacks. Some experts are still predicting that the worst is yet to come. Are we prepared?

March 6, 2021

Reducing Cybersecurity Risk With Minimal Resources

In this exclusive interview, Mike Davis, CISO for alliantgroup, offers practical ways to assess, mitigate and manage cybersecurity risks in your organization — even on a tight budget.

February 28, 2021

Why Do Chief Security Officers Leave Jobs So Often?

In both public and private organizations, chief information security officers have shorter tenures than CIOs. Why do cybersecurity heads so quickly leave jobs — or get forced out?

February 20, 2021

Innovation, Agility and Securing the Mobile World in 2021

Eric S. Green is an industry thought leader who serves as the head of mobile security for HSBC Bank. In this interview, Eric shares insights from his cybersecurity career.

February 13, 2021

Combatting the Growing Cyberthreat of QR Code Abuse

The use of QR codes is growing as a convenient input mechanism to make mobile transactions more efficient. But Qshing, or QR code abuse, is also a growing cyberthreat.

February 6, 2021

What May Be Ahead for Biden’s Infrastructure Plan?

Following the passage of his stimulus plan in the U.S. Senate last week, President Biden is next expected to unveil how he will improve America’s infrastructure, including transit, innovation and energy.

January 30, 2021

Practical Ways Older Adults Can Manage Their Security Online

The new book “Senior Cyber: Best Security Practices for Your Golden Years” by Scott N. Schober offers a timely resource for anyone, especially seniors, who wants an easy, fun read that helps safely manage online life.

January 23, 2021

2020 Data Breaches Point to Cybersecurity Trends for 2021

As the COVID-19 pandemic grabbed 2020 headlines, the list of data breaches in government and the private sector quietly grew. And then came SolarWinds. What’s next?

January 16, 2021

Unemployment Benefits Claims Fraud: New Threats for 2021

After an unprecedented level of unemployment insurance fraud hit states in 2020, new details are emerging on the severity of the ongoing threat in 2021.

January 9, 2021

Most Popular Cybersecurity Blog Posts from 2020

What were the top government security blog posts in 2020? The metrics tell us what cybersecurity and technology infrastructure topics were most popular in the past year.

January 2, 2021

Where Next for Government Cybersecurity in Colorado?

Colorado State Government CISO Deborah (Debbi) Blyth is widely recognized as an innovator among government cybersecurity leaders. Here, she discusses her past accomplishments, COVID-19 challenges and Colorado’s future security plans.

December 26, 2020

Teenspire Global: Innovative Training for the Next Generation

Amid the COVID-19 pandemic, new ideas are springing up around the globe to help marginalized communities. Teenspire Global Mission is a new model with innovative ways young people can make a difference.

December 22, 2020

The Top 21 Security Predictions for 2021

As we recover from the worst pandemic in a century, what will the New Year bring in cyberspace? Here’s your annual roundup of security industry forecasts, trends, themes and cybersecurity predictions.

December 12, 2020

2020: The Year the COVID-19 Crisis Brought a Cyber Pandemic

2020 will be remembered as a uniquely disruptive year — but not just for a global health crisis. Online life was digitally transformed, as exponential change accelerated at home and work via cyberspace.

December 5, 2020

Groundbreaking IoT Legislation Close to Becoming Law

Now that the U.S. Senate has passed the IoT Cybersecurity Improvement Act by unanimous consent, the stage is set for new regulation on securing Internet of Things devices and protecting essential infrastructure.

November 28, 2020

Phoenix CISO Shannon Lawson Shares Top Cyberstrategies

Shannon Lawson, chief information security officer of Phoenix, has had an impressive career that cuts across federal state and local governments. In this interview, he shares his views on all things cyber.

November 21, 2020

NIST Updates Control Baselines, Integrates Privacy

The National Institute of Standards and Technology has finalized 800-53B and 800-53 Revision 5, providing updated guidance on selecting security and privacy control baselines for public- and private-sector organizations.

November 14, 2020

Montana CISO Shares State Security Actions and Priorities

How does a leading state chief information security officer navigate the cyberattacks targeting his state during the pandemic and beyond? Montana CISO Andy Hanks shows us the way in this interview.

November 8, 2020

COVID-19 Turning Black Friday into ‘Cyber November’

Holiday shopping has always brought the year’s best deals — along with plenty of new cyberthreats. This year will bring plenty of both, starting earlier than ever, as work and home life merge.

October 31, 2020

Election Security 2020: The Final Week’s News Roundup

With just a few days to go before the 2020 U.S. Presidential Election, cybersecurity news is pouring in from all over the nation with a range of opinions on what happens next. What can we learn?

October 24, 2020

How Vulnerable Is Critical Infrastructure to a Cyberattack?

A string of new domestic and international cyberwarnings are raising new questions and alarm bells regarding global critical infrastructure protection, and the definition of what is considered critical is expanding.

October 17, 2020

State CIOs Lead Digital Transformation During the Pandemic

In conjunction with its annual conference held this past week, the National Association of State Chief Information Officers (NASCIO) has issued several timely reports that are worth reviewing. Here’s a roundup.

October 11, 2020

Widespread Unemployment Fraud Is Overwhelming State Systems

State government unemployment systems are under attack from fraudulent applications, as Pandemic Unemployment Assistance programs nationwide are being targeted by cybercriminals. And the situation is only getting worse.

October 3, 2020

DHS Works to Protect National Critical Infrastructure

The Department of Homeland Security recently issued a report offering a functional approach to critical infrastructure risk management. The deputy associate director of the National Risk Management Center explains more.

September 26, 2020

Could Estonia Be the Model for Secure Online Voting?

What country does elections best? With all the focus on securing the upcoming U.S. elections, let’s take a look at elections in Estonia with Joseph Carson, a global cybersecurity expert who lives there.

September 19, 2020

Online Learning Still Struggles – Especially With Security

As schools reopen across America, millions of students are still learning (or not) via the Internet. And while the virtual experience has delivered mixed results, almost everyone is struggling with online security.

September 13, 2020

Why Are Some Cybersecurity Professionals Not Finding Jobs?

Global hiring experts declare huge shortages of cybersecurity professionals, so why are some qualified people still having such a hard time finding a job or even getting an interview? Let’s explore.

September 5, 2020

Learning from the Best: James Collins, CIO of Delaware

In this exclusive interview, James Collins, chief information officer (CIO) for the state of Delaware, shares insights from his extraordinary career in government technology leadership.

August 29, 2020

Ransomware During COVID-19

What are current trends for ransomware attacks in 2020? How has COVID-19 impacted these cyberthreats? What are the warning signs to watch out for? Let’s explore.

August 22, 2020

Should State and Local Governments Obtain Cybersecurity Maturity Model Certification?

The Cybersecurity Maturity Model Certification (CMMC) is a certification and compliance process developed by the Department of Defense (DoD). Taiye Lambo explains what is included, and how it can help your organization.

August 16, 2020

As Military Cyber Policies Change, Should Others Do the Same?

Around the world, cyberdefense policies and strategies are rapidly evolving. Is now the time for the public and private sectors to adapt and change as well? Here are some options.

August 9, 2020

Impacts and Recommendations After Big Tech Congressional Testimony

As the world watched, the leaders of the largest tech companies across the globe gave testimony to Congress on many topics. Here’s what happened, what’s next and recommendations for governments and non-profits to consider.

July 25, 2020

Is a New Quantum Internet Coming? The Latest DOE Efforts

The U.S. Department of Energy wants to lead the global race to use quantum computing for a new era of communications. The DOE released a blueprint for a new quantum Internet with stronger security, higher speeds and more.

July 18, 2020

Should You Connect Your Brain to the Internet?

As Elon Musk prepares to roll out new advances in Neuralink’s brain-computer interface in order to cure diseases and expand human capabilities, the privacy, security and ethical implications of chip implants are set to explode. Let’s explore.

July 11, 2020

Getting to the Next Normal in Government Technology

State and local governments face an uncertain future as they battle through the ramifications of our ongoing COVID-19 pandemic. So what will the new normal look like, and how can we get there? Here is a helpful guide.

July 5, 2020

5 Technology Budget Tips for Hard Times

State and local governments are facing budgets cuts, furlough days, tough project decisions and more, but we’ve seen similar situations before. Here’s what we can learn from previous tough times.

June 28, 2020

Security Predictions: COVID-19/Coronavirus Edition

How has COVID-19 changed the global cybersecurity landscape? Are previous security predictions and trends still valid? What’s new? Here’s a midyear forecast refresh outlining the future amid the coronavirus pandemic.

June 21, 2020

How Election Security Has Become a Top Issue

As international attention and media coverage increasingly focuses on the 2020 U.S. presidential election, election security measures will take center stage. Where are the resources?

June 14, 2020

How Protest Battles Grow Online

From hashtags to Twitter posts and from Anonymous hacktivists to personal Facebook postings the Floyd protests are everywhere in cyberspace. What can we learn? Where is this heading?

June 7, 2020

Is a ‘Cyber Pandemic’ Coming?

Over the past week, multiple global business leaders warned of a coming cyberattack with devastating impacts. Is this just FUD or current reality? Let’s explore.

May 31, 2020

Cyber Warfare Growing: From Academic Background to Current Events

As I read the new book, “Cyber Warfare — Truth, Tactics, and Strategies” by Chase Cunningham, global cyberattacks can be seen all around us now, if we look in the right places. Here’s my review of the topic, and the book.

May 23, 2020

Is COVID-19 Making the Internet Sick?

While cyberspace has been a digital savior during this pandemic, with an unprecedented increase in working from home, video chat and ordering goods online, a surge in cybercrime and fraud tell another story.

May 16, 2020

State Government Technology Response to COVID-19

In this exclusive interview, Mississippi CIO Craig Orgeron and CISO Jay White offer their perspectives on how technology and security are shaping the response to the global coronavirus pandemic.

May 9, 2020

Coronavirus Lessons to Help Fight Cybercrime

What can security and technology pros learn for this global pandemic? I asked Dr. Wendy Ng, an industry expert in both biosafety and cybersecurity, for lessons we can learn.

May 2, 2020

Office Work: Will We Ever Go Back?

As the governments lift stay-at-home emergency orders, organizations are grappling with what it means to reopen offices. What will change? Will telework be the new normal? Let's explore.

April 25, 2020

Book Review: Cybersecurity – Attack and Defense Strategies

This second edition book provides a great cybersecurity overview for technology and security professionals as well as a needed comprehensive guide for new cyber pros entering the security field.

April 18, 2020

AI in Your Email: What Is Human Layer Security?

In this exclusive interview with Egress CEO Tony Pepper, we discuss how artificial intelligence (AI) and machine learning can improve your email security and prevent data breaches.

April 12, 2020

What Could Be in a Post-Virus Infrastructure Plan?

Will there be a new round of infrastructure projects coming soon? If so, what do the proposals over past few years teach us about what may be included? Let’s explore.

April 4, 2020

Sharing Security Career Tips During a Global Pandemic

As conferences and travel are canceled due to the COVID-19 pandemic, life changes for all of us. Here’s one example where sharing actually increased and professional connections grew.

March 30, 2020

How Is Covid-19 Creating Data Breaches?

From telework mistakes, to virus-related phishing links, to new work processes to nation-state hackers, here’s how the coronavirus creates new opportunities for cybercriminals.

March 21, 2020

Commission Delivers U.S. Cybersecurity Road Map

A landmark cybersecurity strategy was just released containing recommendations to defend the U.S. from cyberattacks. Here’s what you need to know about the Cyberspace Solarium Commission.

March 15, 2020

Coronavirus Guidance from Our Nation’s Governors and State CIOs

The National Governors Association, the National Association of State Chief Information Officers and other key organizations released guidance for our COVID-19 emergency. Here’s a roundup of resources.

March 8, 2020

Coronavirus Actions, Plans and Risks to Consider

How are state and local governments responding to COVID-19? From public health actions to directives for staff, what emergency response steps and risks should be considered? Here’s a coronavirus playbook roundup.

March 1, 2020

Coronavirus: The Unexpected Human Element at RSA Conference 2020

Fears of the coronavirus made the recent RSA Conference in San Francisco different than any previous security conference. Here are RSAC 2020 details and future questions.

February 21, 2020

Cyber Minds: Expert Insights on Blockchain and Much More

The new book “Cyber Minds” offers insights on cybersecurity perspectives and recommendations across the cloud, data, AI, blockchain and IoT. The interviews make this book a must read for cyber and technology pros.

February 8, 2020

What Will We Learn from the Iowa Caucus App Fiasco?

The events that unfolded this past week with the Iowa Democratic caucus app are unprecedented. But putting politics aside, what can we learn about launching important apps? What is the true cost when an app fails?

February 2, 2020

Coronavirus Scams: Phishing, Fake Alerts and Cyberthreats

As new global stories emerge by the hour on the coronavirus, bad actors are (again) trying to confuse online updates with phishing scams and destructive malware. Here’s why action is required now.

January 25, 2020

Most Popular Cybersecurity Blog Posts from 2019

What were the top security blog posts in 2019? The metrics tell us what cybersecurity and technology infrastructure topics were most popular in the past year.

January 19, 2020

Ohio Chief Information Officer Shares 2020 IT Strategies

In this exclusive interview, Ervan Rodgers II describes actions from his first year as state government CIO in Ohio and shares key state technology strategies for the '20s.

January 11, 2020

State and Local Governments Face Iranian Hacking Threats

U.S. state and local governments and critical infrastructure operators are on high alert for cyberattacks following recent events in Iraq and Iran.

January 5, 2020

Tech Lessons from Star Wars Movies

We have reached the end of an era with Star Wars Episode IX being released. Here's my personal look back at more than 40 years of movies with a few technology-career and even life lessons to take away from a big fan.

December 23, 2019

2019: The Year Ransomware Targeted State & Local Governments

Another eventful year online, with more data breaches, malware battles and identity thefts. But the surge in successful, targeted ransomware attacks against governments and hospitals is the top 2019 cybersecurity story.

December 19, 2019

The Top 20 Security Predictions for 2020

Whether you call them cybersecurity forecasts, online risk trends or security predictions, here’s a roundup of what our top security companies, industry experts and tech magazines are saying about the year (and decade) ahead. How can you prepare for 2020?

December 7, 2019

When Will Blockchain Technology Be a Game-Changer?

The promises of blockchain technology are vast, but the results to date have not met expectations. So where is blockchain heading, and when will we be there?

November 30, 2019

Book Review: Virus Bomb

What might happen if a nation-state really did launch a serious cyberattack against the United States? This intriguing novel explores what a 'Cyber Pearl Harbor' might look like.

November 24, 2019

European Cybersecurity: What Happens After Brexit?

If opinion polls are correct, the upcoming United Kingdom general election on December 12 could finally make Brexit a reality. But what happens to European cybersecurity cooperation? Let’s explore.

November 16, 2019

The Internet: Looking Back and Forward 50 Years

The Internet turned 50 years old this year. So where are we heading in the next 50 years? Here’s a look at the excellent report from Pew Research and Elon University surveying global experts.

November 9, 2019

How to Address Career Blind Spots and Challenge Assumptions

We all have professional blind spots. Nevertheless, studies show that technology professionals often underestimate the harm that these weaknesses can cause your career, if not addressed. So what can be done?

November 3, 2019

How to Safely Shop Online This Holiday Season

New lingo, new analytics, and another surge in online holiday sales is expected this November and December. How can you benefit and stay safe in cyberspace as you shop? Let’s explore.

October 26, 2019

Where Next After National Cyber Security Awareness Month?

As we wrap up another National Cyber Security Awareness Month and head into a new decade, it’s time to look back and forward to ask what it will take to move the cybersecurity action needle in America?

October 19, 2019

Shadow IT: A Business Risk or Competitive Advantage?

A new report highlights the many benefits and risks that enterprises face regarding ‘shadow IT,’ unmanaged IoT devices and implementing new (not approved) technology. Let’s explore.

October 13, 2019

Book Review: 'Cybersecurity Is Everybody’s Business'

This book is packed with great information on myriad 21st-century Internet security, data privacy and cybersafety topics. I highly recommend it for everyone who’s trying to protect themselves in cyberspace — all of us.

October 6, 2019

NASCIO Still Growing After 50 Years of Serving States

As state CIOs, public-sector thought leaders and tech companies descend on Nashville for the 2019 NASCIO Annual Conference, we examine why the nonprofit has thrived for half a century — and the bright future ahead.

September 29, 2019

Book Review — 'Cyber Risk Leaders: Global C-Suite Insights'

'Cyber Risk Leaders' by Shamane Tan explores the art of communicating with executives, shares tips on navigating through corporate challenges and reveals what the C-Suite seeks in professional partners.

September 22, 2019

What's Next for Technology and Renewable Energy?

Ahead of the start of weeklong global climate change protests that began on Sept. 20, Amazon, Google, AT&T and other technology companies pledged unprecedented new commitments to renewable energy.

September 14, 2019

Phil Bertolini Set the Excellence Standard for County CIOs

Oakland County, Mich.’s technology leader for 18+ years retired at the end of August. Bertolini is globally recognized a top local government CIO. Here, we get a glimpse of what we can learn from his experience.

September 8, 2019

CISO Expectations Are Becoming Impossible to Achieve

The multi-year rise in data breaches, ransomware attacks and insider threats has led to a surging global need for cybersecurity leaders to save the day. But here’s why the CISO ideal is harder than ever to deliver.

September 3, 2019

Digital Kazakhstan: Addressing the Global Cyberchallenge

Digital Kazakhstan offers a fascinating case study on how leading countries around the world are adapting to digital transformation, as well as the cyberchallenges that come with 21st-century innovation.

August 25, 2019

Lessons Learned from Federal Agency Cybersecurity Projects

How does cybersecurity work get done in the federal government? Ryan Tappis, a trusted industry expert as a managing director of consulting firm Northramp, describes current 'inside the Beltway' security lessons.

August 17, 2019

Do American Technology Workers Do Vacations All Wrong?

As the summer winds down, there is no better time to reconsider how you plan future vacations. Here’s why. Hint: Public-sector employees may need to take more high-quality time off, like their private-sector counterparts.

August 11, 2019

Lessons from the Massive United Kingdom Power Outage

Another major power outage, this time affecting the United Kingdom's National Grid, causes public outrage and many unanswered questions. What can we learn, and relearn, from this incident?

August 4, 2019

How Local Governments Can Address Cybersecurity Challenges

In an interview with Teri Takai, who’s the former CIO for the U.S. Department of Defense and for the states of California and Michigan, we explore how local governments can tackle the growing cyberthreat.

July 27, 2019

Governors Announce Initiative to Address Aging Infrastructure

The National Governors Association held their summer meeting for 2019 in Salt Lake City, Utah, this past week. Dramatically improving our nation’s infrastructure tops the list of priorities. What’s next?

July 21, 2019

Another Look at Global Insider Cybersecurity Threats

Details from recent data breaches as well as results from several security industry studies raise new (and old) questions about insider threats within organizations. What can be done? Let’s explore.

July 14, 2019

New Issue Brief: State Cyber Disruption Response Plans

The National Governors Association released an issue brief examining state cyber disruption response plans. State and local governments should review this report to improve their preparedness for cyberattack disruptions.

July 7, 2019

Book Review of Cold-War Thriller, 'The Spy in Moscow Station'

‘The Spy’ offers a real-life, high-stakes spy story. We get a glimpse at NSA history in the ‘70s and ‘80s, learning about rivalries, motivations and persistence that continue to drive 21st-century global espionage.

June 29, 2019

Wanted: Effective CISOs Who (Happily) Stay Longer

Most security leaders change organizations every few years. The reality is that people leave jobs for many reasons. Here’s why this often becomes a problem for enterprises, the CISO or both.

June 23, 2019

Citizen Engagement Helps Welsh Police Reduce Road Fatalities

Operation Snap in Wales improved road safety and reduced fatalities by 40%. By enabling secure public reporting of road traffic offenses using videos and photos, Welsh police overcame budget cuts while improving results.

June 16, 2019

North Dakota CISO Sean Wiese on the State’s New Cyber Vision

North Dakota is implementing unified cybersecurity across the 7 branches of government. Sean Wiese, North Dakota CISO, explains how this new, singular approach is breaking-down silos and redefining shared cyberservices.

June 9, 2019

Government Cyber Focus: Planning for 2020 Election Security

The 2020 election security topic has risen to become the top cybersecurity agenda item for federal, state and local governments. Here’s a round-up of new bills, reports and more on securing the voting process.

June 2, 2019

Ransomware: Who’s to Blame or Not to Blame in Baltimore Attack?

As the ongoing impacts of the ransomware attack against the city of Baltimore worsen, the blame game has reached national news headlines. Let’s explore some of the precedent-setting issues involved.

May 26, 2019

Could a New Wave of Cryptocurrencies Be on the Horizon?

Will Facebook’s plans to introduce ‘GlobalCoin’ next year result in a surge of new cryptocurrency offerings? Many experts believe so, and here’s why.

May 20, 2019

States Explore Opportunities at National Summit on Cybersecurity

As state government leaders left Shreveport, Louisiana, this week to return home, there was a sense of how far the nation has come regarding cybersecurity — tempered by a recognition of how much more needs to be done.

May 12, 2019

How Can Health Care Innovate With Cybersecurity in Mind?

In this exclusive interview with Patrick Hale, the award-winning CIO from VITAS Healthcare in Miami, we cover health-care innovation, technology, virtual reality solutions, cybersecurity and so much more.

May 5, 2019

CyberPatriot Competitions Offer Answers to U.S. Cybersecurity Workforce Challenges

As the Presidential Executive Order on America’s Cybersecurity Workforce was released this week, students around the country were celebrating another year of cyber competitions. Here’s how the two topics come together.

April 28, 2019

On Cybersecurity: What’s Next for Homeland Security?

An exclusive interview with Jeanette Manfra of the DHS Cybersecurity and Infrastructure Security Agency. She discusses current cyberthreats, actions and strategic plans for defending the U.S. from cyberattacks.

April 22, 2019

New Survey Says Americans Remain Positive on Technology & Innovation

Despite the growing number of data breaches, cyberattacks, privacy issues and other problems associated with technology, Americans remain optimistic on technology and innovation, according to a new report.

April 14, 2019

Tax Fraud and the Dark Web in 2019

As we head into the day that federal income taxes are due in the USA, new research shows that identity theft is becoming easier, cheaper and more prevalent in 2019 via the dark web. Let’s explore.

April 7, 2019

Security Culture Questions to Consider

Here are three basic questions that security leaders need to keep coming back to in order to assess enterprise security culture and ongoing cyber-risk.

March 31, 2019

Ransomware Attacks Becoming More Widespread, Destructive, Expensive

After more destructive attacks globally against critical infrastructure, the stakes are growing for the public and private sector regarding ransomware. Let’s explore the latest malware, including LockerGoga.

March 24, 2019

Where Next for Smart Cities?

As we head into the 2020s, most cities strive for the label “smart city.” But what does that mean and where is this trend going? Here’s your roundup of smart city developments, plans and ongoing challenges.

March 18, 2019

An Inside Look at New York State Government Cybersecurity

As part of its enterprise IT transformation, New York state radically transformed its cybersecurity efforts. In this exclusive interview with CISO Deborah Snyder, we see how her team implemented their impressive program.

March 10, 2019

RSA Conference 2019: What You Need to Know

The 2019 version of RSA Conference in San Francisco has come and gone. Here are some of the product and session highlights, major themes and excellent resources to dig deeper into myriad cybersecurity and technology topics.

March 3, 2019

Governors Focus on Infrastructure, Offer Technology and Security Priorities

The National Governors Association held its 2019 Winter Meeting in Washington, D.C., this past week, and the top focus was on infrastructure. And yet, a deeper look shows the vital role of technology, cybersecurity, partnerships and much more.

February 23, 2019

Why Many Organizations Still Don't Understand Security

Despite a growing number of security incidents and headline data breaches, many security and technology professionals express the view that their government or company or nonprofit organization doesn't make cybersecurity a priority. Here's how you can help.

February 17, 2019

Data Breaches: What Do the Numbers Mean?

Another day, another data breach. But what are the trends? Here’s a closer look at Risk Based Security’s 2018 data breach report, along with some analysis, wider context and thoughts on what we can learn from the metrics.

February 10, 2019

To Understand IoT Security: Look to the Clouds

The Internet of Things (IoT) is growing exponentially. But security and privacy concerns are piling up at the same time. How can we understand where this trend is heading? Here's what we can learn from the history of the cloud.

February 3, 2019

How Can We Improve Trust in Technology?

Global business and government leaders are urging more optimism and trust in their technologies as we head into the 2020s, but the public and private sectors face a technology trust deficit. Let’s explore.

January 26, 2019

Cyber-Hijacking Campaign Sets off Global Government Alarm Bells

Calling all governments: We have a serious Domain Name Systems (DNS) problem. The public (and private) sector must take action now.

January 20, 2019

Corporate Best Practices in Security Awareness and Training Programs

Lear Corporation is a leading global supplier of automotive seating systems and electrical systems. And Lear executives, staff and contractors also understand the importance of cybersecurity. CISO Earl Duby shows us how that works so well at Lear.

January 13, 2019

How to Improve Cyberstrategy by Learning NFL Defensive Tactics

In one of the best security presentations of 2018, Nick Drage explains how to improve cyberdefense using NFL (American football) strategies and tactics. I interviewed him to learn more.

January 6, 2019

Most Popular Cybersecurity Blog Posts from 2018

What were the top security blog posts in 2018? The metrics tell us what cybersecurity and technology infrastructure topics were most popular in the past year.

January 2, 2019

The Top 19 Security Predictions for 2019

It’s time for the cybersecurity industry’s annual predictions, online threat forecasts and cybersecurity trend reports. Here’s your roundup of top insights from the leading security companies and cyber experts for 2019 and into the 2020s.

December 31, 2018

Technology Trends for the New Year That Are NOT About Security

2019 will bring some exciting new technology stories. How will your home and office get smarter? What else can we anticipate?

December 15, 2018

The Future of Remote Work

Will remote work dramatically change the 2020s? Disruption is already beginning. Let’s explore future trends for digital nomads and everyone else — including the cybersecurity implications of our changing workforce habits.

December 10, 2018

2018: The Year Privacy Took Center Stage

As we look back at the top security stories of the past year, 2018 will be remembered as the year that privacy topics kept showing-up in headlines as never before. Here’s a year-end round-up of 2018’s top cyberstories.

December 2, 2018

Introducing: The Cybercrime Support Network

How can individuals and small businesses respond if they become a victim of online crimes? How can law enforcement help? Kristin Judge, founder, CEO and president of the Cybercrime Support Network, answers these questions in an exclusive interview.

November 25, 2018

Chip Implants: The Next Big Privacy Debate

Some say we will all, eventually, be chipped. Others say — never! Let the privacy, legal, technical, professional, medical, security, political, religious and ‘oh so personal’ battles begin.

November 18, 2018

Why the Georgia Cyber Center Is Special

From the initial vision to the public-private investment to the plans for the future, the Georgia Cyber Center (GCC) is unique, significant and even special. In this interview with Georgia CIO Calvin Rhodes, we explore how the GCC happened, why the project became so successful and what’s planned for the future.

November 11, 2018

Another Look at Virtual Integrity

November marks 10 years since my book, Virtual Integrity: Faithfully Navigating the Brave New Web, was published. One huge fact is even clearer today than a decade ago: Virtual actions dramatically affect offline life. Here's why we need the 7 habits of online integrity now more than ever.

November 4, 2018

Securing Your Vote: Are the 2018 Elections Protected? It Depends

The 2018 midterm elections are just days away, and many in America have cast their ballots in early voting. So where are we on election security, following the 2016 Russian attempts to influence our election results? Here’s a round-up of the latest national media headlines, investigative reports and front-line analysis regarding our 2018 election security.

October 28, 2018

State of the States for Tech and Cyber

The survey results from two major government studies were released at the National Association of State CIOs (NASCIO) Annual Conference in San Diego this past week. The technology and cybersecurity results signal major change is coming — in many diverse ways. Here’s what you need to know as we head into 2019.

October 21, 2018

Where Next With Cloud Security?

As we head toward 2020, cloud computing security continues to rapidly evolve around the globe. With an exponential growth in enterprise data moving to the cloud, and a surge in cyberattacks occurring at the same time, what protection steps are leading organizations taking now? How are best practices being implemented by federal, state and local governments to ensure compliance? Let’s explore.

October 14, 2018

Security Audit Weaknesses Offer a Silver Lining

Technology and security pros generally view audits as bad news, especially when material findings are released to the public. Nevertheless, audit reports can also offer unique opportunities to improve. Here are some silver linings to consider.

October 7, 2018

Expert Interview on 2018 Election Security

David O’Berry is a leading cyberexpert, the former agency CIO in South Carolina government and an experienced thought leader in cutting-edge cybersecurity areas, including election security. In this exclusive interview, I ask him about federal, state and local cyberpreparedness regarding the upcoming 2018 and 2020 elections.

September 29, 2018

New National Cyber Strategy Message: Deterrence Through U.S. Strength

The new White House cybersecurity strategy makes one message clear: America will not sit back and watch when attacked in cyberspace. On the contrary, in areas ranging from critical infrastructure to space exploration to intellectual property protection, the USA will respond offensively as well as defensively in cyberspace. Here’s what you need to know about President Trump’s new cyber strategy.

September 23, 2018

Missouri CISO Michael Roling Leaves a Legacy of Excellence in Government Cybersecurity Leadership

Missouri’s state government cybersecurity leader for most of the past decade is leaving his role this week and moving to the private sector. Michael Roling has been recognized as one of the top security leaders in the nation. Here are some top lessons learned along with an exclusive interview highlighting his career and accomplishments within Missouri government.

September 16, 2018

Duration: What Tech and Cyber Pros Can Learn from Hurricane Florence

As the country prepared for another massive hurricane to strike the U.S. last week, a different type of storm threat emerged as the greatest concern for the Carolinas. What can we learn?

September 9, 2018

Is More Tech Regulation Coming?

New congressional hearings this past week on a variety of technology issues may mean more regulation is coming soon. From data privacy to social media influence in elections to biased search results, where is this discussion heading? Let’s explore.

September 1, 2018

New Guide on State Data Breach Laws

A new guide covering a summary of data breach laws in every state and territory was recently released by Digital Guardian. The guide attempts to answer questions like: How do state laws protect you? Here are the details.

August 25, 2018

Phishing Scams Targeting Pastors: Who’s Next?

Pastors, churches and other faith-based groups are the latest target of phishing scams nationwide. Here’s what you need to know and why we all need to be vigilant and spread the word.

August 18, 2018

Sharing Vital Cyberinformation: An Interview with the New Jersey CISO

CISO Michael Geraghty wears many hats with one challenging mission: to defend New Jersey’s digital density. He directs the NJCCIC — a one-stop shop for cybersecurity information sharing, threat analysis and incident reporting. And his team does so much more — offering global reach and meaningful cyberimpact. Here’s how.

August 11, 2018

Stock Options, IPOs and Acquisitions Accelerate Cybertalent Divide

How can the public sector attract and retain cybertalent? That question is getting harder to answer with recent private-sector initial public offerings (IPOs) of stock, company takeovers and a hot stock market for cybersecurity firms.

August 5, 2018

From Critical Infrastructure to Elections to Autos: Management of Cyber-Risk Takes Center Stage

There were two major cybersecurity summits in the USA this past week, but only one central message. Whether talking elections and a new DHS risk management center in New York City or discussing cars and trucks and autonomous vehicles in Detroit, cyber-risk management took center stage.

July 30, 2018

The Fundamental STRENGTH in Effective Security Awareness Programs

Security awareness programs cannot solve all your cyberproblems. Many security awareness training programs have significant flaws and fail to deliver on initial promises. But these program faults can be avoided or corrected. Here is the way to address concerns and make your security awareness program a fundamental strength within a comprehensive security program.

July 23, 2018

For Better Civil Discourse: Watch and Learn from Tim Tebow

Our civil discourse in the United States has dramatically worsened. Online name-calling, cyberstalking, harassment, cyberbullying and worse are now showing up on American streets in everyday life. With midterm elections coming soon and a new Supreme Court nominee currently being considered, some predict the situation to worsen further — both online and offline. Where can we turn for potential answers? Here’s how the controversial Tim Tebow provides a role model that can help.

July 14, 2018

Top Executives Share Insights on Implementing Secure Next-Generation Technology in New Book

The newly updated book, 'Borderless Behavior Analytics — Second Edition: Who's Inside? What're They Doing?' has recently been released. I strongly urge technology, security and business leaders to read this book. Here’s why this second edition is another 'must-read.'

July 8, 2018

Amit Yoran Interview: Cyberattacks Targeting Critical Infrastructure Must Be Addressed

Current Tenable Chairman and CEO Amit Yoran’s career is beyond impressive. Yoran is a cybersecurity rock star. In this exclusive interview, we provide a glimpse into his security past, Tenable’s current technology priorities and future cybertrends. His immediate focus: Critical infrastructures are facing daily cyberattacks and our cyberexposure to system vulnerabilities must be an urgent priority.

July 1, 2018

How to Keep Vacations Safe Online

After a family vacation out East, here are some observations, tips and reminders about using your tech devices on the road. How can we enable online security while enjoying family fun at the same time? What advice helps keep data on your personal (and professional) laptops, smartphones and other devices safe at the beach, in airports, visiting hotels and more?

June 23, 2018

Who Reports Data Breaches?

What language does your organization use (both internally and externally) to talk about security incident response? Was that recent cyberevent an incident or a data breach or both? How do you know? Who decides on required actions — both formally and informally? Let’s explore.

June 16, 2018

How Does Arizona Government Address Information Security?

Mike Lettman, the state chief information security officer (CISO) in Arizona, has a wealth of cybersecurity experience across multiple states. In this exclusive interview, Mike discusses what’s hot in his state government cyberefforts and points to what’s next to keep constituent data safe.

June 10, 2018

FIFA World Cup in Russia Bringing Cyberthreats at Home and Abroad

The No. 1 global sporting event, which only comes around once every four years, is about to begin in Russia. Billions of people are expected to be watching and commenting and clicking on all things football (soccer) over the next month. But with all the fun, and money and attention, there are criminals preparing as well. Let’s explore the FIFA World Cup cyberthreats and what can be done about security.

June 3, 2018

How to Get Management Support for Your Security Program

What works (and what generally doesn’t work) to help obtain the needed dollars, staff and other resources for an effective, ongoing, culture-changing, cybersecurity program? Let’s take another look at answers to this important question.

May 27, 2018

GDPR in the USA: What’s Next?

GDPR-mania has arrived. With the new European Union (EU) law taking effect on May 25, 2018, the Internet will never be quite the same. Opinions on GDPR are all over the map, and lawsuits have already been filed. Here’s a media roundup on what organizations in the USA and around the world are saying, and doing and planning regarding GDPR.

May 20, 2018

Why You Need the Cybersecurity Framework

The U.S. National Institute of Standards & Technology (NIST) recently released version 1.1 of the Cybersecurity Framework, and the security industry response is stronger than ever. Here are the facts — along with a front-line expert interview on what public- and private-sector organizations are doing now to plan and implement the new guidance.

May 13, 2018

Upcoming 2018 Global Automotive Cybersecurity Summit in Detroit

Top auto industry and government leaders are coming together for an important automotive cybersecurity summit in Detroit. The 2nd Billington Automotive Cybersecurity Summit is set for Aug. 3, 2018.

May 6, 2018

Evaluating Technology and Security Leaders

What sets a CISO apart? Or, more broadly, how can we differentiate one tech CxO from another? What standards or metrics can business executives use for evaluating technology and security leaders? Here is my ‘easy-to-use’ but ‘hard-to-excel-at’ formula for grading security and technology leadership performance.

April 29, 2018

What Happened When Government Technology Leaders Met?

Another National Association of State CIOs (NASCIO) Midyear conference has come and gone in 2018. What did we learn and where can we go from here?

April 22, 2018

RSA Conference 2018: Security Industry Is a Work in Progress

Another action-packed RSA Conference wrapped up this week in San Francisco. What is clear is that our cybersecurity industry is a work in progress on many levels. Here are some conference highlights and top-notch cybersecurity content to ponder.

April 15, 2018

Privacy, Ethics and Regulation in Our New World of Artificial Intelligence

With technology changing so rapidly all around us, how can we think about the ethical implications of what is now becoming possible? With big data analytics, machine learning and artificial intelligence (AI) growing so fast, can we agree on inappropriate uses? Are privacy regulations even workable? Will hackers just go around the rules? Let’s explore.

April 8, 2018

How to Present Security So People Will Listen — and Take Action

Technology professionals often have a hard time presenting important online safety topics to the masses. Key ‘cyber hygiene’ messages are usually ignored. Here are some tips to help — and reasons to keep trying.

April 1, 2018

After Facebook Privacy Mistakes: Who Is Next?

Are the privacy issues at Facebook the tip of a larger iceberg? Who might be next? Will more whistleblowers emerge who reveal client data misuse?

March 25, 2018

After Crash: Tough Questions to Consider on Autonomous Vehicles

After a self-driving Uber SUV fatally struck a pedestrian last weekend in Arizona, global attention is concentrated on the future of autonomous vehicles. Here is a summary of what happened, the public reaction and some of the tough questions that need to be addressed moving forward to build trust.

March 18, 2018

Next Steps After Russian Attacks on U.S. Critical Infrastructure

In an unprecedented move this past week, the US CERT revealed details of Russian hacking of U.S. critical infrastructure operators, including energy, nuclear, water, aviation, and critical manufacturing facilities. What was announced and where is this heading next? Most important, how can your public- or private-sector organization respond? Let’s explore.

March 10, 2018

Cyber Range: Who, What, When, Where, How and Why?

What works in training students to protect enterprises from data breaches? How can experienced cyberpros practice defending their networks from emerging cyberthreats? Where are the right tools, effective processes and hands-on techniques combined to simulate real-world challenges faced from hackers? The answer may be at a cyber range near you. Here’s why the trend is exploding.

March 4, 2018

Cybersecurity for Energy’s Critical Infrastructure

How reliable and resilient is our nation’s critical energy infrastructure? How must we improve amid growing concerns regarding cyberthreats? What are the greatest vulnerabilities? How are physical threats, natural disasters and cyberthreats to energy being addressed? Let’s explore.

February 25, 2018

Election Security: What Can Governments Do Now?

Protecting the integrity of elections is a hot topic. From cyberattacks to fake news influencing public opinion to other forms of external manipulation that could undermine democracies, voting security has risen to become a top issue for global governments. Here’s what you need to know and potential next steps for the public and private sectors.

February 18, 2018

Where Next for Trump’s Infrastructure Plan?

President Trump formally unveiled his new infrastructure plan this past week. So what’s in it and where will infrastructure improvements likely go next? Here’s a roundup of coverage, related alternatives and thoughts on next steps.

February 11, 2018

Security Pros Need a Mentor: Here's Why and How

The Multi-State Information Sharing and Analysis Center (MS-ISAC) started a mentoring program in 2012, and this nationwide career-enhancing strategy for security leaders has grown to become stronger than ever. Here are the details on how the mentoring program works and interviews on the benefits with government mentors and mentees. Most important, why you should care and how to get involved.

February 4, 2018

Winter Olympics Online: Tips for Work Networks and Home Safety

The 2018 Winter Olympics are about to start in South Korea. The world will be watching from before the opening ceremonies this week to the closing ceremonies at the end of the month. My prediction: There will be surprise network impacts. Here’s what you need to know to keep your online connections working, safe and secure.

January 27, 2018

Public-Sector Tech: Ongoing Issues and Opportunities

As we attempt to connect our government technology dots over the past few years, there are many enduring themes and disruptive topics that keep showing up. So what was hot in 2017 that will endure well into 2018 and beyond? Here’s my rundown of technology trends that both elected leaders and government CxOs keep talking about — with highlights from the joint NASCIO/PTI Technology Forecast for 2018.

January 21, 2018

What Can We Learn from Hawaii's False Alarm?

The false missile alert that was sent out from emergency management personnel in Hawaii last week sparked an initial public panic, national outrage, global media coverage and numerous government investigations. Official inquiries are ongoing and many more reports are coming, but what do we know so far? Here are the details and some of the lessons that we can take away.

January 14, 2018

The Case for Cybersecurity Certifications

How can you enhance your security career prospects? What are the top cybersecurity certifications and why do they help? Are employers requiring security certifications? To answer these questions and much more on cybersecurity certifications, I turned to Jay Bavisi, who is a top global expert on cybersecurity certifications and the founder and president of the EC-Council Group.

January 7, 2018

Most Popular Cybersecurity Blog Posts from 2017

What were the top cybersecurity blog posts in 2017? The numbers don’t lie, and the metrics tell us what topics readers liked, and shared, and commented on, and viewed the most in the past year. Here are the top cyberblogs, with special emphasis on how cybersecurity impacted technology infrastructure and government technology people, cyberstories, along with societal impacts.

January 4, 2018

The Top 18 Security Predictions for 2018

What will happen in cyberspace in 2018? How will technology impact the real world over the next year? Once again, the cybersecurity industry is full of security predictions, cybersecurity trend reports, cyber forecasts, IT security analysis and red-hot security examples to allow everyone to try to connect the dots to the future. Here’s your annual security industry prediction roundup from the top cybersecurity experts, magazines, companies, analysts and more.

December 30, 2017

Can We Take People Out of Internet of Things Security?

How can we provide better security for Internet of Things (IoT) devices? Yevgeny Dibrov writes that cybersecurity can be improved solely with technology improvements. I disagree. Here’s why I believe removing people from IoT security is ‘mission impossible.’

December 16, 2017

2017 Review: The Year Hurricanes Devastated Land, Data and Trust

As 2017 draws to a close, the record-breaking hurricane season tops the list of stories that we will ponder for decades. Nevertheless, the new cyberstorms in 2017 were just as potent, striking at the heart of our financial system with more unprecedented data breaches, cyberextortion, CEO fraud and fake news that undermined trust in virtually every area of life. Here’s your year-end cybersecurity and infrastructure roundup of the top online stories — and one attempt to connect the dots.

December 10, 2017

Government Contractors Face New Year Security Deadline for DoD

By Jan. 1, 2018, government contractors who work for the Department of Defense (DoD) or the intelligence community are mandated to comply with a NIST special publication 800-171. In addition, these security guidelines from NIST provide a meaningful road map for other government organizations and contractors regarding cybersecurity protections. Here’s an exclusive expert interview that offers details to help.

December 2, 2017

After Uber Data Breach: Lessons for All of Us

Another major data breach stunned the world in November, but this incident was unique in several ways. What can we all learn from the Uber data breach? Here’s an industry roundup of security analysts’ lessons learned from Uber, as well as my top takeaways for all of us.

November 25, 2017

How Football Can Help Explain Data Breaches

What's really going on with data breaches, hackers and cybersecurity? The online world is dramatically changing all around us, so how can we understand recent hacking events? Football can help, here's why.

November 19, 2017

Best Tips for Safe Online Holiday Shopping

How can you stay secure online (and offline) as you shop this holiday season? Whether at home or work, whether braving the mall crowds on Black Friday or surfing the Net on Cyber Monday, what should you watch out for? Here’s a roundup of some of the best advice I’ve seen from credible sources.

November 11, 2017

How to Recover from Cyber Incidents in Government

What actions do organizations need to take to prepare for cybersecurity incidents? The National Institute of Standards and Technology (NIST) has answers in Special Publication 800-184, titled: 'Guide for Cybersecurity Event Recovery.' Here’s an exclusive interview with one of the authors.

November 5, 2017

Lack of Trust in IoT Security Shows More Regulation Is Coming

A new survey by Gemalto indicates that 96% of enterprises and 90% of consumers lack confidence in the security of Internet of Things (IoT) devices. The majority of 1,050 IT and business decision-makers and over 10,500 consumer respondents favor more government regulations to protect data across the IoT ecosystem.

October 29, 2017

Puerto Rico: After Dark Chapter, Future Hope Using Technology

Hurricane Maria brought unprecedented devastation to Puerto Rico, and the majority of residents are still without power. Nevertheless, with new federal aid and some of the world’s top technology leaders getting involved, the hope for a better tomorrow is now returning.

October 20, 2017

DMARC: States Should Follow Federal Directive to Enhance Email and Web Security

The Department of Homeland Security (DHS) has mandated that all federal executive branch agencies implement Domain-based Message Authentication, Reporting and Conformance (DMARC) to improve email security. In the same directive, DHS also mandated better Web security protections be put into place. I believe state and local governments should follow the lead of their federal counterparts and make implementing DMARC a priority. Here’s why.

October 15, 2017

NASCIO Demonstrates Public-Sector Technology Best Practices

Where can public-sector organizations go to find best practices regarding people, process and technology? How can governments successfully partner with the private sector in repeatable ways? Some of the best answers come from the National Association of State Chief Information Officers (NASCIO).

October 8, 2017

Can Telework Work Well?

There is a new debate about the old topic of working from home. What’s trending: a revisit of the pros and cons of telework. Should we go back to the way we were, with more time spent in offices, or do something else? Let’s explore.

September 30, 2017

On Data Breaches: Beware of Professional IT Pride Leading to a Fall

We have witnessed headline-grabbing data breaches at Equifax, the Securities and Exchange Commission (SEC) and Deloitte in the past month. Many other global companies and governments have seen massive security incidents over the past few years. There are endless lessons learned, but very few talk about this cyber blind spot that impacts us all.

September 22, 2017

Hack Back Law: Why the Future May Be Like the Legalization of Marijuana

Hacking back has been in the news a lot in 2017, with new proposed legislation that would legalize forms of a more “active defense” for companies. When added to the flurry of ‘hack back’ activity that is below the public radar right now, it seems likely that some form of legalization is inevitable. Let’s explore.

September 16, 2017

On Emergency Preparedness: What Have We Learned After Harvey and Irma?

Two historic hurricanes affected two of our most populated states in America in the past month. It’s still early, but what can we say about city, state and federal government emergency management lessons learned so far?

September 9, 2017

After Equifax Breach: Hurricanes Overshadow Massive Cybersecurity Storm

As all eyes turned toward the Caribbean and Florida this week in essential preparation for Hurricane Irma, Equifax announced a different kind of unprecedented ‘incident’ that could significantly impact half of the U.S. population. Here’s what you need to know and how to respond to protect your identity and your family.

September 3, 2017

After Hurricane Harvey Rescue Efforts: Texas Infrastructure Recovery is Just Beginning

One week after Hurricane Harvey hit Texas, there is a mix of weariness and determination in southeast Texas. As the water recedes, the scale of the devastation is becoming clearer. Nevertheless, the heartwarming stories from brave responders bring hope for the long recovery effort ahead.

August 26, 2017

Illinois CISO Discusses the State Cybersecurity Strategy

Illinois state government has launched a 2017-2019 cybersecurity strategy that is both bold and ambitious. Here is what state Chief Information Security Officer (CISO) Kirk Lonbom had to say about where the state is now and where it is going regarding government cyberdefense.

August 20, 2017

Seven Keys to Strengthen Your Cybersecurity Culture

Why is cybersecurity culture so important to organizational success? How can you build a culture of effective security? What are the actions, tips and steps that can help strengthen your cyberculture? Here's a primer.

August 13, 2017

On Metrics: Responding to Failing Security Grades

A 2017 State of Cybersecurity Metrics Annual Report was recently released by Thycotic, and this new survey provides excellent insights into a disturbing lack of cybersecurity metrics worldwide. Most organizations are failing at cybersecurity metrics, planning and performance. Here are the report details — and what you can do to succeed by improving metrics and your overall cyberdefense results.

August 6, 2017

‘No More Ransom’ Program Grows: Initiative Helps Global Organizations Deal with Ransomware

Law enforcement and global IT Security companies have joined forces to disrupt cybercriminal businesses with ransomware connections. Here’s how your organization can benefit from the ‘No More Ransom’ project. Also, what can you do if you are held for ransom?

July 30, 2017

Where Next for Microchip Implants?

Employees at Three Square Market, a technology company in Wisconsin, will have a small chip injected in their hands this week for security convenience. But where is this biohacking trend heading? Is there a microchip implant in your future?

July 23, 2017

Book Review: Borderless Behavior Analytics

With the death of traditional security architectures, what new cyberstrategies can protect global enterprises moving forward? This book offers an impressive lineup of global CIO and CISO luminary experts who provide thoughtful answers and insightful perspectives on the coming era of user and entity behavior analytics (UEBA) and identity analytics (IdA).

July 16, 2017

Why Offering Bug Bounties Will Be Widespread, Even in Government

Coordinated vulnerability disclosure programs, often called “bug bounty” programs, will become much more widely adopted over the next few years. Here’s an exclusive interview with Marten Mickos, a leading cyber industry expert, to explain why bug bounties are growing fast — and how your organization can benefit.

July 9, 2017

Seven Cyberactions for States after Recent Global Hacking Incidents

As new reports surfaced about hackers targeting nuclear facilities and as significant cyberattacks continue to escalate in 2017, what lessons can governments learn from recent events? Most important, how can states prepare for this ‘new normal’ in cyberspace? Here are seven actions to reconsider.

July 1, 2017

Ransomware Epidemic: Where Next After Petya and WannaCry?

Ransomware that is also a ‘wiper attack’ is being called Petya by some, NotPetya by others and other names such as ExPetya or Petrwrap or GoldenEye. But regardless of the name, this nasty cyberattack was wreaking havoc across the globe for days. Was this really sabotage in disguise? Where is this trend heading? Let’s explore.

June 25, 2017

Will California’s New Travel Ban to Named States Affect Government Technology Partnerships?

California banned state-funded travel to four more states this week over what they deem to be discriminatory laws in Alabama, Kentucky, South Dakota and Texas. But what wider impacts might this action have on a diverse range of topics — from out-of-state collegiate sport competitions to government technology partnerships nationwide? Let’s explore.

June 18, 2017

7 Tips for Securely Moving Data to the Cloud

The technology trend is clear. The continued growth in cloud computing adoption is impressive in both the public and private sectors. And yet, many organizations still hold back for security reasons. Here are seven tips for moving enterprise data to the cloud securely.

June 11, 2017

On Millennials: A Story About Government Service, Travel, Father’s Day and More

Recent surveys reveal that millennials strongly value new experiences and making lasting memories. I saw this trend in a business trip with my daughter more than a decade ago. Here is a true story that touches on careers in government, travel, one millennial daughter and Father's Day.

June 2, 2017

The Trouble if Security Awareness Training Is Mainly a Punishment

Every technology leader wants a security-aware, cyber-savvy enterprise culture. But what does that mean and how can we get there? There is an ongoing debate regarding security awareness training techniques, engagement and overall effectiveness. Let’s explore.

May 26, 2017

After Manchester Bombing: The Good, the Bad and the Ugly Online

In the days following the terrorist bombing in Manchester, England, the worldwide reactions and dramatic events offer important lessons for the future. So what online and offline responses can we observe and learn from after such a terrorist attack?

May 21, 2017

The Insider Threat: New Report Highlights Problems, Recommendations and Resources

The Institute for Critical Infrastructure Technology recently published a fascinating report on insider threats. This excellent white paper defines insider threat categories, offers deep Web screenshots, recommendations and resources to help.

May 14, 2017

New Trump Executive Order on Cybersecurity: Just the Beginning

After months of speeches, numerous cyber discussions and plenty of draft documents, President Trump signed an executive order on cybersecurity this week. Here is a roundup of the details, industry reactions and next steps.

May 7, 2017

How to Transform Business Using Technology

Digital transformation is all the rage. Tech-driven business innovation is happening all around us. But how do game-changing technology investments get implemented in real life? Where are examples of success? Here are practical answers from a top business transformation expert.

April 29, 2017

Can Blockchain Technology Secure Your Vote?

How can we build more trust in future election results? Can we securely move to online voting to increase voter turnout? Some experts think that blockchain technology is part of the answer, and this interview with Votem CEO Pete Martin covers where we are and where we are heading to secure the vote.

April 22, 2017

Analytics, AI and Orchestration are Top New Security Topics

I recently asked a group of leading CISOs and security industry CEOs what new security topics and technologies were hot right now. What did they say?

April 15, 2017

Will Congress Help Fund New State and Local Cyber Programs?

Back in early March, a bipartisan group introduced the State Cyber Resiliency Act. If passed and funded, the legislation would provide grants for state and local governments to improve cybersecurity protections and incident response. Here’s what you need to know.

April 9, 2017

Trump’s Infrastructure Plan: What’s Included?

Over the past few weeks, President Trump’s trillion-dollar infrastructure plan has been getting plenty of global media attention. Here are some of the latest developments, along with recent statements regarding what’s included.

April 1, 2017

Ransomware in Government: Who, What, When, Where and How?

Ransomware attacks are grabbing many headlines. Here are several recent public-sector ransomware incidents, along with what steps you can take to protect your enterprise.

March 29, 2017

Cybersecurity Has a Metrics Problem — Here’s What You Can Do About It

Is your metrics program coordinated with decision-making?

March 25, 2017

Significant Data Breach Impacts Job Applicants in 10 States

America’s JobLink (AJL), a multi-state, Web-based system that links job-seekers with employers around the country, has been hacked. Here’s what you need to know.

March 19, 2017

Online Denial of Service Attacks Are a Growing Concern

Distributed denial of service (DDoS) attacks are accelerating around the globe. A new report highlights that the scale of the cyberdefense problem is growing. What can be done?

March 10, 2017

The State of the Union for IoT — or Not?

There are currently two radically different views regarding the Internet of Things (IoT) in our world. One is bright. The other is dark. Which one will win out? Can they come together — somehow? Here are two opposing perspectives — followed by a potential third way.

March 4, 2017

How Will Governors Address Cybersecurity and Infrastructure in 2017?

The National Governors Association (NGA) 2017 Midyear meeting was held last weekend in Washington, D.C., and the top priorities included cybersecurity and innovative infrastructure strategies in the states. Here are top highlights and several next steps.

February 26, 2017

How Secure Is Our Smart Grid?

The U.S. Department of Energy released an alarming report in January 2017, saying that the U.S. electric grid is in imminent danger from a cyberattack. So where have we been, where are we now, and where are we going regarding smart grid security?

February 19, 2017

RSA Conference 2017: Hacker Highschool Highlights from the Cyber Village

What tips and techniques help parents teach their kids online? Where can cybersecurity professionals turn for resources to train teens about ethical hacking? How can we address cybersafety in new ways moving forward? Here are some answers from the 2017 RSA Conference Cyber Village.

February 13, 2017

Trust and Risks Both Growing in Government Clouds

A new Intel Security cloud report reveals that cloud computing adoption is growing rapidly in government and elsewhere all over the world. At the same time, CIOs are struggling to keep enterprise data safe in the cloud. Here is what you need to know.

February 5, 2017

What to Do About Fake News, Fake Apps and Fake Government Services

Fake news is now headline news. Add in fake apps and fake websites, and governments have a huge credibility problem. What can the public sector do? Let’s explore what you can do for real.

January 28, 2017

State Chief Security Officers Share Current Plans

What's hot right now in cyber? I asked four leading state government chief information security officers (CISOs) about emerging cyberthreats, their state’s top cyberproject priorities for the coming year and for their views on the future outlook for cybersecurity executives. Here’s what they said.

January 20, 2017

President Trump on Cybersecurity

What has President Trump already said and done regarding cybersecurity? How should our 45th president address our many online problems at home and abroad? Why am I more optimistic than most commentators about our new leader’s pragmatic approach to cyber? Here’s why.

January 15, 2017

What Election Technology Actions Are Needed Now?

The 2016 U.S. presidential election shined a light on outdated election technology. So what steps must be taken and what technology upgrades are needed to restore the public trust in how we select our government leaders? Going further, how can all government service kiosks be made more secure and reliable? Let’s explore.

January 8, 2017

The Top 17 Security Predictions for 2017

What will happen in 2017? Whether you prefer to call them cybersecurity forecasts, online risk trends or security predictions, the answers are similar. Here’s a roundup of what our top industry experts, security companies and tech magazines are saying about the year ahead — and what you can do to prepare.

January 6, 2017

Top Cybersecurity Blog Posts From 2016

What cybersecurity blog posts were most popular in calendar year 2016? The numbers don’t lie, and the metrics tell us what readers liked, and shared, and commented on, and viewed the most in the past year.

December 18, 2016

2016: The Year Hackers Stole the Show — With a Cause

In 2016, hacktivists took center stage. Hacktivism disrupted many global causes — providing new online missions with anti-establishment goals that wounded public credibility and trust. Here’s a cyber roundup highlighting major international activities online, and how they impacted news headlines in the past year.

December 10, 2016

Recount 2016: The Good, the Bad and the Ugly

As recounts in states wind to a close, courts wrap up their legal cases and electors prepare to assemble to formally declare Donald Trump the next president of the United States, what lessons have we learned from the 2016 recount process?

December 4, 2016

Why Governments Need Coordinated Vulnerability Disclosure Programs

What is a formal ‘vulnerability disclosure program,’ and why is it needed in a government near you? Watch this CSPAN panel discussion and learn.

November 25, 2016

The Trouble With Recounts in the Name of Hacking

With suspicions of hacking, Jill Stein is asking for a recount of the votes cast in Wisconsin, Pennsylvania and Michigan. This is a bad idea. Here are 10 reasons why.

November 20, 2016

Where Next for Government CIOs?

After the election, many government technology executives are in a period of transition. Whether you are coming or going or not sure, most public sector IT leaders are now asking: Where next?

November 13, 2016

Will President-Elect Trump Surprise on Cybersecurity?

I'm expecting more surprises from President-elect Trump, this time on cybersecurity policy. Here's why.

November 5, 2016

Trust the Vote: Here’s Why

Despite reports of rigged elections, vote flipping, election fraud, domestic and foreign hacking and much more, you can trust the counting of the votes in America. Here’s why.

October 30, 2016

Should Insecure IoT Devices Be Banned?

After the Mirai botnet was recently used to bring down large portions of cyberspace, there have been new calls for regulating Internet of Things (IoT) devices. Since the voluntary IoT security approach is clearly failing, what can we expect moving forward? Are better standards needed? Should government mandate more security for IoT devices for consumer protection? Let’s explore.

October 23, 2016

Hacker Ethics in a World of Online Leaks

Regardless of who wins, this presidential election campaign has highlighted a series of data leaks with personal information about candidates that will be remembered far after voting is over. New norms are developing regarding online privacy and radical transparency that question the boundaries of hacker ethics in our globally connected world. Many are asking: Will personal privacy even survive in the years to come?

October 16, 2016

Need Talent? Consider Hiring Our Heroes

As the public and private sectors struggle to find technology and security professionals with the right talent, skills, integrity, work ethic, perseverance and attitude to excel in the 21st century, I strongly urge you to consider ‘Hiring Our Heroes.’ This effective fellowship program helps military veterans transition into civilian life, and offers so much more. Here’s what you need to know and how your organization can benefit from this outstanding program.

October 9, 2016

New Guide Offers Advice on Securing Internet of Things Products

The Cloud Security Alliance working group on the Internet of Things (IoT) released new guidance this week for securing the IoT product ecosystem. The 80-plus page guide is titled: 'Designing and Developing Secure IoT Products.' The report offers 13 recommendations to raise the overall security level of IoT products and services.

October 2, 2016

After Massive Yahoo Data Breach: Have We Learned Anything?

Another massive, headline-grabbing data breach was announced this week from Yahoo. What have we learned, and what wider security industry questions just keep resurfacing?

September 25, 2016

What's the Likely Future of Cybersecurity in the States?

During a keynote session at their annual conference this week in Orlando, the National Association of State CIOs (NASCIO) released their biennial survey results on state cybersecurity. While the overall report trends (compared with the previous three surveys) seemed encouraging, many attendees asked me if the real situation was as positive as the data seemed to imply. Let’s explore the state CISO survey answers and the rest of the story.

September 18, 2016

Online Customer Service: Do This — Not That

Even the best customer service organizations in the world make common online and call center mistakes. Public- and private-sector organizations cannot rest on past successes to ensure future client satisfaction. Here’s a simple case study that shows what to do, and not do, regarding people, process and technology.

September 11, 2016

Building and Executing a Winning CISO Strategy

How can a government CISO get executive buy-in to obtain authority, autonomy and budget? What are the keys to success in the public sector? What are examples of important cybersecurity projects that are ongoing in major U.S. cities like Atlanta? Here is an exclusive interview with former Atlanta CISO Taiye Lambo.

September 3, 2016

How to Respond to Social Engineering Incidents: An Expert Interview

Steven Fox is a top government cybersecurity expert, Distinguished Fellow with the Ponemon Institute and frequent speaker at top security events all over America. In this exclusive interview, Steven shares several low-tech but sophisticated social engineering techniques that hackers use to gain (unauthorized) privileged access into government systems and large and small company networks. Most important, what can we do to prevent fraud and respond to incidents that do occur?

August 28, 2016

Making the Top Smart City in Europe

How do you build a 'smart city?' What innovative factors lead to award-winning smarter technology examples to emulate? Which European city is the smartest? Let’s explore.

August 20, 2016

Your Security Team is Outgunned: Where's the Help?

Most experts believe the good guys continue to fall further behind in our global hacker wars. So how did we get to this point in cyberspace? Most important, where can you go for help in this new Wild West online?

August 14, 2016

Digital Detox: Why (and How) Many Now Unplug to Recharge

Do you unplug when you go on vacation? How about placing boundaries or time limits on your children’s screen time? What can be done to help? Is it time to schedule a digital detox?

August 6, 2016

Millennials in Government — or Not?

What's happening with millennials in government? Are new strategies needed to attract and retain young people into public-sector jobs? Let's explore.

July 31, 2016

Understanding New Hacktivism: Where Next for Hackers With a Cause?

In 2016, hacktivism has become a mainstream force impacting millions of global lives. ‘Hacking for a cause’ has now become a weapon that transcends far beyond ‘antisocial geek misfit’ boundaries. From the DNC email hack to the Panama Papers, a surge in new hacktivism is now the top anti-establishment online tool for achieving a diverse set of causes around the globe.

July 24, 2016

Could the Rio Olympics Bring Enterprise Network Problems?

As the world looks forward to the 2016 Summer Olympic Games in Brazil, a long list of problems and solutions have received media attention. But regardless of what happens in the arenas, is your organization prepared? Here’s a primer on potential online trouble spots and how you can prepare.

July 17, 2016

Auto Industry Bug Bounty Programs Point to Our Security Future

Top auto industry companies have announced coordinated vulnerability disclosure programs. This use of ‘bug bounties’ to encourage global hackers to help identify security holes points to the future of critical infrastructure protection. Here’s what’s happening now with crowdsourcing vulnerability management, and why the entire cybersecurity industry is taking notice.

July 10, 2016

Data Backups: What Are You Really Doing?

Over the past few months, several random events got me thinking a lot more about data backups — again. I know, I know — a boring topic that you already dealt with years ago. You are tempted to just move on. But for your own good, please read this.

July 2, 2016

Smart Cities: The Good, the Bad and the Ugly

More and more devices are plugging into your government’s corner of the Internet of Things (IoT), but are we truly implementing the right projects in 'smart' ways? Here’s what you need to know about the state of smart cities opportunities along with some potholes to avoid and questions to be answered.

June 26, 2016

Brexit Effects on Technology, Security and More

The people of the United Kingdom (UK) have voted to leave the European Union (EU). But what does Brexit mean for technology and security professionals around the world in the public and private sectors?

June 19, 2016

How Terrorists' Use of Social Media Points to the Future

What can we learn from the tragic global events of the past 10 days? The use of social media is front and center in tracking online and offline crimes, especially terrorist activity. How can we prepare for tomorrow?

June 12, 2016

3D Government: How Will Augmented Reality (AR) Disrupt the Future of Technology?

Bold claims are again being made by hot new startups and the technology giants about the coming age of augmented reality (AR) and virtual reality (VR) applications. While most of the focus has been on gaming, retail and travel, the impact for governments could be huge. Here’s why.

June 5, 2016

Good Questions Regarding Online Threats

What are the top cyberthreats currently impacting public- and private-sector enterprises? Here are the questions that cybersecurity industry experts are talking about.

May 29, 2016

Inaugural Global Automotive Cybersecurity Summit Coming to Detroit

A new cutting-edge technology event with cybersecurity solutions for connected and autonomous cars is being organized by Billington CyberSecurity. The cyber summit will include CEOs in the auto industry as well as top government and technology leaders from around the world.

May 22, 2016

Beyond Spear Phishing: How to Address Whaling and More

First, there was phishing … then came spear phishing … and now there is whaling — and other new sophisticated social engineering techniques. The bad guys are modifying their deceptive practices. Here’s what you need to know.

May 15, 2016

Book Review: Cybersecurity for Everyone

How do you secure your home or small business network? A recently released book by Terence L. Sadler offers practical, helpful answers.

May 8, 2016

State Technology Leaders Focus on Procurement, Cybersecurity and Agile

The National Association of State Chief Information Officers (NASCIO) held their Midyear Conference in Baltimore this past week. There were plenty of hot topics on the agenda, including: enabling innovation through agile software development, the continuing need for procurement reform and a big push on cybersecurity.

May 1, 2016

7 Reasons You Should Care if the United Kingdom (UK) Leaves the European Union (EU)

On June 23, the world will be watching as the citizens of the UK decide whether to remain in the EU. The ramifications of this vote go far beyond Great Britain or Europe. History shows us that American interests and our future security are directly tied to this “special relationship.” Here’s why you should care what happens.

April 24, 2016

Will a Smartphone Replace Your PC?

Will you buy another desktop computer or laptop? Or, can your smartphone meet your technology needs? Should your business continue buying PCs? The IT infrastructure industry is divided, but the answer affects more than you think. Here’s why.

April 17, 2016

Autism and Technology: What Can Governments Do?

April is Autism Awareness Month, and there are plenty of new developments to highlight. The number of private-sector initiatives is amazing, but can governments do more? What can innovative technologies do to aid early intervention for autism spectrum disorders? Currently technology is playing a significant role for adults with autism. That being said, should governments be doing more to hire and help these talented individuals with technical skills? Here’s my view.

April 10, 2016

7 Ways to Be More Innovative

You’ve probably heard the phrase “innovate or die.” But not everyone got the memo. So how does innovation really work in practical terms at the office? Regardless of whether you tend to be an innovator or protector, here are seven ways to help your business and career.

April 3, 2016

Developing Government Cyber-Leaders

As the government pay gap grows larger with the private sector, where will the next generation of government cybersecurity leadership come from? What's the best background to enable success? Who should consider government cybersecurity roles? The public and private sectors are battling a growing list of global cyberthreats. With more data breaches, cyberattacks targeting critical infrastructure and new Internet of Things vulnerabilities, the competition for competent cybersecurity increases.

March 27, 2016

Ransomware Emergency: What Can You Do?

The rise in ransomware has taken a dramatic turn for the worse in 2016. Several hospitals recently declared states of emergency. Meanwhile, thousands of global businesses and consumers are now becoming victims of hacking attacks leading to extortion. This very serious situation requires the immediate attention of everyone from PC owners to small businesses to the large governments. Here’s the problem and what actions you must take now to protect yourself.

March 20, 2016

Hacking March Madness: How Cybercriminals Exploit Popular Sports Events

We’re in mid-March, which means the NCAA College Basketball Tournament is in full swing. But there is more than one way to bust your March Madness bracket, and cybercrooks are also working overtime to grab a piece of the cash. Here’s how (and why) major sporting events are top targets for global hackers.

March 13, 2016

Two New Cybersecurity Reports Offer Legislative Opportunities and Data Breach Scenarios

This is a tale of two studies. The first report from the Governing Institute was sponsored by the National Cyber Security Alliance (NCSA) and AT&T, and covers the intriguing results of a state government legislative survey on cyber. The second reports offers a “Data Breach Digest” from Verizon which elaborates on 18 different data breach scenarios worth considering. Both reports are free and bring excellent recommendations and worthwhile opportunities.

March 6, 2016

Security Trends From RSA Conferences

As I flew back to Michigan after another RSA Conference this week, I thought about the highlights, takeaways and major themes in the security industry right now. At the same time, I couldn’t help but look back and reflect on the past several RSA Conferences in San Francisco on a personal level. Bottom line: These RSA Conferences tell quite a bit about where we have been and where are we heading in cyberspace — on both a personal and industry level.

February 28, 2016

The Biggest Trouble with Smartphones

Everybody loves their smartphone, with global adoption soaring and new helpful apps popping up daily. Faster speeds, new models and plenty of competition to lower prices make your mobile device the center of technology innovation. But is there an ‘Achilles Heel’ to watch out for? The answer is yes — and here’s what you can do to help protect yourself.

February 22, 2016

Book Review: 'Hacked Again'

Scott Schober is small business owner who tells intriguing stories about how his company was hacked — and what happened next. This easy-to-read book is a good primer on the importance of online security for business owners, but it also shows how easily identity theft can happen to anyone, even a cybersecurity expert. Best of all, this book offers practical security advice with helpful steps that we all can follow to secure our corner of cyberspace.

February 13, 2016

Can 'Hacking Back' Be An Effective Cyber Answer?

With the exponential growth in data breaches over the past few years, the concept of ‘hacking back’ is growing in popularity. Proponents ask: If I can use a gun for self-defense in my home, why can’t I similarly ‘hack back’ against attackers who invade my cyberspace? Let’s examine that premise from different perspectives.

February 7, 2016

Help! When ‘Things’ Can Send Emails

Does using ‘smart’ devices mean that our inboxes will be even more overflowing with more email? For now, probably.

January 30, 2016

Transforming Cyber and Infrastructure Security: An Interview with the DHS Cyber Chief

An exclusive interview with Dr. Phyllis Schneck, deputy under secretary for Cybersecurity and Communications for the National Protection and Programs Directorate within the U.S. Department of Homeland Security.

January 24, 2016

Interview with Will Pelgrin and Phil Reitinger on the New Global Cyber Alliance

What is the new Global Cyber Alliance (GCA)? Why is it important? Here is an exclusive interview with GCA co-founder and chair Will Pelgrin, as well as the new CEO and president of GCA — Phil Reitinger.

January 21, 2016

‘Anonymous’ Targets Michigan, Activates #OpFlint

#OpFlint promises online attacks against Michigan Gov. Rick Snyder’s administration in response to the water emergency in the city of Flint.

January 17, 2016

Where Next on Internet of Things (IoT) Security?

The 2016 edition of the Consumer Electronics Show (CES) just wrapped-up as the North American International Auto Show sprang into full swing. So what do they tell us about the state of cybersecurity for the exploding Internet of Things (IoT) market?

January 10, 2016

Seven Career Lessons From Kirk Cousins

You are next in line on your organization's depth chart. For a long time, you just wait in the wings for your opportunity to lead. For years, you watch, and learn, and practice, and occasionally get a few opportunities to show what you can do. And then, you get promoted. New management elevates you to #1. But can you succeed? You make a lot of early mistakes. Critics outnumber supporters. Nevertheless, you overcome and excel. How? There are important career lessons to learn from Kirk Cousins

January 4, 2016

Most Popular Security Blogs from the Past Year

What were the most popular ‘Lohrmann on Cybersecurity and Infrastructure’ blogs written in 2015? Viewer metrics are in, and they tell an interesting story. Here are the results, along with some intriguing trends and links to the top content.

December 27, 2015

The Top 16 Security Predictions for 2016

More security predictions than ever before. As I examined hundreds of expert forecasts for 2016 and beyond, with cyber trends and predicted technology events from top companies, it is hard to be optimistic about our online situation. And yet, the combined predictions tell us an important story about online life. So where is cyberspace heading? What surprises await us? Here's your annual one-stop roundup of what security experts are telling us will happen next.

December 19, 2015

2015: The Year Data Breaches Became Intimate

Something new, even unprecedented, happened this year in our cyber world. The most noteworthy data breaches were not focused on financial data. Here’s a data breach recap from 2015 – along with my views on what these events tell us.

December 13, 2015

Nationwide Public Safety Broadband Network RFP Approved

The FirstNet Board approved the release of an RFP to build, operate and deploy a nationwide public safety broadband network this week. Meanwhile, the Department of Homeland Security Science and Technology Directorate named 10 people to a new Interoperability Advisory Panel. So are next-generation interoperable communications for nationwide first-responders finally getting close?

December 6, 2015

Cybersecurity in Latin America

What is the current situation regarding cybersecurity in Latin America? To answer this question, I turned to Mr. Carter Schoenberg, who is a respected industry security expert who recently started a cybersecurity company in Panama. Here’s the informative interview.

November 28, 2015

5 Online Mistakes to Avoid During the Holidays

The holiday season has arrived and so have the opportunities for Internet deals, sending and receiving holiday cards and many more online activities. Nevertheless, with the good comes the bad – as phishing scams, one-time bargains that are too good to be true and other cyber traps can lead to major headaches. Here are five common online mistakes to avoid as we head towards another New Year’s Eve.

November 21, 2015

After Paris Attacks: What Is the Future of Encryption?

The recent round of global terrorist attacks have reignited the homeland security versus personal privacy debate. Law enforcement officials point to the apparent use of encryption by ISIS terrorists as proof that encrypted communications need “back doors” to protect the public. But many security experts disagree. So what is the future for encrypted communication as we head into 2016?

November 16, 2015

Get Ready for Next-Generation Endpoint Security

Advanced cyberthreats, zero-day exploits, sophisticated malware, ransomware and more. These are just a few of the daily challenges that enterprises face as they try to protect their network endpoints each and every day. How can it be done? Enter next-generation endpoint security products and services. Here’s an overview.

November 7, 2015

Interview with Florida’s Technology and Security Leadership

Where is Florida heading regarding cybersecurity in government? What are the top priorities and hot projects? Hear what the Florida state CIO and CISO have to say in this exclusive interview.

November 1, 2015

Emerging Cyberthreats: What, When, Where and How?

Emerging cyberthreats are a hot topic at cybersecurity summits, in executive boardrooms and remain a top priority with back-office security teams. Here's what you need to know about where we've been, where we are and where online security threats are going.

October 24, 2015

Governments Need an Internet of Things Strategy

From smart drones to smart homes to smart cars that drive themselves, the world is dramatically changing all around us. So are governments ready to take advantage of these new innovative opportunities emerging within the Internet of Things (IoT)? Or, as almost everything gets connected to the Internet, could these newly connected devices become “Trojan Horses” that inadvertently bring the next generation of data breaches? What’s being done globally in the public sector with IoT right now?

October 18, 2015

What Are Government Chief Information Officers Doing Now?

The National Association of State Chief Information Officers (NASCIO) held its annual conference in Salt Lake City, Utah, this past week. So what were the highlights? From the Internet of Things (IoT) to cloud computing to data center consolidation, which projects, technologies and issues rose to the top of the agenda? Most important, what’s on the minds of government CIOs, and what projects are they actually implementing as we move into 2016?

October 10, 2015

From Mississippi to Utah: Cybersecurity Awareness Month is Front and Center

It is October, so National Cybersecurity Awareness Month (NCAM) is front and center from sea to shining sea. But attention on information security, along with events and helpful publications, have evolved over the years. It’s time to take another look at the new resources along with helpful tools and relationships that can last long after your Halloween candy runs out.

October 4, 2015

North Carolina IT Leaders Share New Technology Agency Plans

North Carolina Gov. Pat McCrory just established the new Department of Information Technology as the single source of accountability and authority over state government technology projects. State CIO Chris Estes will lead the consolidation effort, along with executive support from his leadership team, including Chief Information Risk Officer Maria Thompson. So who are these leaders? What are their plans and priorities? Where are they heading regarding information security? These are just a few of the questions answered in this exclusive interview.

September 27, 2015

Will the New Cyber Understanding with China Bring Change?

A new 'understanding' on cybersecurity was announced this past week during Chinese President Xi Jinping's formal state visit. But while this agreement certainly offers a positive step forward for security in cyberspace, many questions remain unanswered.

September 20, 2015

For Elected Officials: A Guide to Address Online Security

Elected officials often fail to prioritize cybersecurity until after a data breach when it's too late. So what are the important security issues and actions that are needed by state and local elected officials right now? A new guide by Governing magazine and CGI was just released to answer that question.

September 11, 2015

Where Next for Government Cybersecurity?

On the 14th anniversary of 9/11/01, there are plenty of reasons to be thankful regarding public safety in America. And yet, there is also a growing list of cyberthreats that are grabbing news headlines almost daily. To help understand where we are today and where we are going regarding federal government cybersecurity initiatives, I interviewed Dr. Andy Ozment, the U.S. Department of Homeland Security assistant secretary, who is the new point person for the National Cybersecurity and Communications Integration Center.

September 6, 2015

Free Open Source Security Tools Offer Intelligence-Based Defense

Lockheed Martin recently released new open source tools to help defend enterprises from cyberattacks. The system, called Laika BOSS, offers a malware detection and analysis framework for security analysts to share intelligence with other cyber defenders worldwide. Here's my interview with leading cyberexperts who are offering cutting-edge insights and workable solutions to emerging battles in cyberspace.

August 30, 2015

What to Do About Phishing?

Phishing and spear-phishing are growing problems. The clever enticements to click are getting more sophisticated and more targeted than ever. The data breach costs are mounting. What can your organization do to take phishing awareness and response to the next level?

August 23, 2015

Reinventing: What Government Leaders Can Learn From Tim Tebow

Many government technology leaders are struggling. From national headlines to local audit findings, the majority of the news has not been good. Meanwhile, public trust in government as a whole is near historic lows. What can be done? Is it time for reinvention? Back to the drawing board? If so, there is a lot to learn from the journey and actions of Tim Tebow.

August 16, 2015

The Security Startup Challenge: Winners Offer Innovative Ideas

The technology and security industries are struggling to keep up with an ever-growing list of problems and cyberattack vectors. There has been a consistent call for new solutions to address evolving cyberspace challenges. One popular answer: New innovative startup companies to help. In order to accelerate these companies, the 'Security Startup Challenge' was formed earlier this year by Kaspersky Lab and several partners. And now, we have the winners.

August 9, 2015

Intelligence Sharing Partnerships Are Needed to Improve Critical Infrastructure Cybersecurity

A new survey of top IT executives reconfirms the findings from other recent cybersecurity studies regarding the online defense at utilities and other vitally important public- and private-sector organizations. The report outlines what is good and what needs improvement in our online defense of critical infrastructure facilities.

August 2, 2015

Hacking: When Your White Hat Is Really a Black Hat

A series of recent news headlines reveal cybersecurity experts, who were being paid to defend networks, battle malware and fight cybercrime, were actually black hat hackers. What happened and what can be done to address this growing trend? Is your enterprise prepared?

July 25, 2015

Talking Cyber: Ten Tips for Conference Speakers, Supervisors and Parents

Talking about security in effective ways is hard – whether the audience is an auditorium full of professionals or a small room at home with a few children. Here are some tips to help.

July 19, 2015

Do You Really Know Your Network?

How well do you know your IT infrastructure? Who is communicating with whom across your network backbone? What systems are bandwidth starved? With legacy systems, PII data, hundreds of networks, complicated databases, hybrid clouds, data warehouses, countless mobile devices and outsourced functions needing 7x24 access, how do you determine what's truly secure? As we prepare for the new Internet of Things (IoT) era, here are some questions that need answers now.

July 12, 2015

The Big Halt: 7 Lessons from Recent Computer Outages

On July 8, 2015, a string of major computer outages occurred at approximately the same time - grabbing global media attention. Significant operational disruptions occurred as a result of computer incidents at the New York Stock Exchange (NYSE), the Wall Street Journal (WSJ) and United Airlines. The nation briefly 'woke-up' to our reliance on technology and got a small taste of the fear that may come if a cyberattack cripples critical infrastructure. What lessons can we learn from these incidents? How can public and private-sector enterprises better prepare for more inevitable disruptions?

July 5, 2015

Should We Start Over with the Internet?

Network failures. Colossal data breaches. Global online privacy problems. The bad news reignites debate. Do Internet troubles necessitate a new start? Is it time to push the 'reset' button? But others say that cyberspace is improving and will go much further -- even solving a long list of historic problems. One thing is indisputable: The Internet is changing rapidly before our eyes.

June 28, 2015

False Alert: Can You Really Trust that Tweet for Emergency Communications?

A recent article in The New York Times describes a highly coordinated disinformation campaign using social media. This scary development raises new questions about the reliability of alerts and other emergency communications that rely on social media platforms. Will disinformation campaigns become a growing trend that will undermine recent advances in spreading important information during emergencies?

June 21, 2015

Data Breach: Why We Need a Scale

Data breaches are becoming much more common. Most states have laws mandating the public disclosure of data breaches where personally identifiable information (PII) is at risk. Cyberinsurance policies even cover data breach costs. However, not all data breaches are the same. We need a data breach scale. Here's why...

June 13, 2015

Top Strategies from Ohio Government's Technology and Security Leaders

We are continuing the series of interviews with top CIOs and CISOs from around the nation regarding the best state and local government cybersecurity strategies. This week, we turn toward the Buckeye State to learn from two respected executive leaders. At a time when the federal government is reeling from a major OPM data breach, this security discussion has never been more important.

June 6, 2015

A Life of Lies and Spies: Interview with Author Alan B. Trabue on his Real-Life CIA Adventures

Alan B. Trabue worked for the CIA for over 38 years, and he has hundreds of true stories to tell about domestic and foreign agents and lies and spies. He has just published an amazing book that tells about his career as a covert operations polygraph interrogator with exciting travels all over the world. For anyone who is interested in polygraph exams or for those who are intrigued by the complexities of intelligence operations around the world, you must read this book. Here is a brief book preview and an interview with the author of 'A Life of Lies and Spies.'

May 30, 2015

Interview with Retiring MS-ISAC Founder Will Pelgrin and Incoming CIS CEO Jane Lute

Will Pelgrin started the MS-ISAC more than a decade ago, and he is a leading voice in government cyberdefense. Tomorrow is his last day with the Center for Internet Security, and I caught up with him and new CEO Jane Lute to discuss the past, the present and the future of global cybersecurity -- especially within governments.

May 25, 2015

Smart Cities Resources: Who, What, When, Where and How?

Everyone is talking about smart cities. And yet, new public- and private-sector questions are emerging as more organizations engage with this global technology megatrend. So how can you take these opportunities to the next level? Who are the leaders within this hot Internet of Things (IoT) category? Which academic studies and white papers offer best practices and the most helpful resources to take your region to the next level? What cyber-risks are emerging? Here are answers and resources to consider.

May 18, 2015

Cyber Terrorism: How Dangerous is the ISIS Cyber Caliphate Threat?

Industry experts disagree on whether the Islamic State’s ability to mount a dangerous cyberattack is a top concern or an emerging online threat or completely overblown. But one thing is not in doubt, ISIS is making news headlines in 2015 for their exploits in cyberspace. In my view, ISIS is an emerging online threat to keep a close watch on. Here’s why.

May 11, 2015

Federal Cybersecurity Legislation

The latest bills, privacy concerns and information-sharing actions.

May 3, 2015

Middle East Cybersecurity and Infrastructure: Dubai Offers a Different Model

I traveled to the United Arab Emirates (UAE) this past week to present the opening keynote at the Gulf Information Security Expo & Conference (GISEC 2015) in Dubai. The event offered a refreshing mix of leading global voices on security and technology topics. But most surprising, the Gulf region's public and private sector executive leaders who presented, the companies exhibiting and the amazing city as a whole offered attendees a different perspective and a positive model for the current cybersecurity and technology infrastructure challenges in the Middle East and the world as a whole.

April 24, 2015

At RSA Conference 2015: Government Announcements Top Highlights

Attendance records were probably broken, and there were numerous very good sessions. Still, surprisingly, government announcements may have been the highlight of the week.

April 19, 2015

Security is Job One for Washington State Government Technology Leadership

We are continuing the series of interviews with leading state government CIOs and CISOs from around the nation. This week, we turn to Washington state and its security priorities and technology plans.

April 11, 2015

Hacking Critical Infrastructure is Accelerating and More Destructive

A new report released this week by Trend Micro and the Organization of American States (OAS) shows a dramatic increase in cyberattacks directed against critical infrastructure owners and operators.

April 5, 2015

Seven Ways to Gain Support for Cyber Programs in Government

Are you having trouble getting the needed resources for your cybersecurity program or key projects in government? Is staffing, funding or gaining executive support not adequate to get the job done right? Do you want to strengthen your influence and trust with management? While there are no easy answers, these ideas may help.

March 29, 2015

Enterprises Prepare for Windows 10: Microsoft IE to Become New Legacy Replacement

Just as many government organizations wrap up enterprise XP migrations a year after initially planned, it's time to start ramping up another major infrastructure effort. Microsoft Windows 10 will be arriving this summer. What new features are coming and is it time to prepare your strategic upgrade plan?

March 22, 2015

Oakland University Cyber Summit: A Unique, Inspiring Model Run by the Students

On Friday, March 20, 2015, CyberOU, the student cybersecurity club at Oakland University, held its second annual Cyber Summit in Michigan. Here's why CyberOU is a student-run organization for others around the world to emulate.

March 15, 2015

How Do the Technology Leaders at the Port of Portland Protect Sensitive Data?

We are continuing a series of educational interviews with state and local government technology and security leaders around the nation. This week we visit an intriguing local government in the Pacific Northwest part of the country to learn more about its overall mission and how it keeps customer data safe.

March 7, 2015

Missouri Technology Leaders Share Cyberprotection Strategies

What cybersecurity priorities, challenges, actions and plans are Missouri's CIO and CISO working on right now?

March 1, 2015

FCC Ruling on Net Neutrality: What's Next?

By a 3-to-2 vote along party lines, the Federal Communications Commission (FCC) passed new rules on Net neutrality last week. The rules establish the Internet as a utility, but court battles loom before the FCC actions can take effect. Here's what happened, a summary of the news coverage, what it all means, reaction from different sources and what is likely to happen next.

February 23, 2015

Governors' Briefing on Cybersecurity: People are Everything

'States Leading on Cybersecurity' was the name of session at National Governors Association (NGA) Annual Winter Meeting on Sunday. Homeland Security Secretary Jeh Johnson addressed looming DHS shutdown impacts as well as federal / state opportunities to work together to share cyberthreats and other critical information across the public and private sectors.

February 14, 2015

Opinion: White House Summit Missed a Larger Opportunity on Cybersecurity

The White House Summit on Cybersecurity and Consumer Protection at Stanford University was a very good event with meaningful outcomes. But it could have been much more.

February 8, 2015

Indiana to Launch New IN-ISAC and Enhance Cyberdefense Programs

Unique Indiana state government partnership with Purdue University will also utilize private-sector expertise to defend state networks from next-generation cyberattacks. This breaking news demonstrates that cyberdefense is a top priority for Indiana Gov. Mike Pence.

February 1, 2015

Cyber disruption: Is your government ready?

Governments around the globe are rushing to prepare for computer-generated threats that can cause real-world calamity to our way of life. And while opinions vary on the likelihood of human error causing a major crisis or hostile cyberthreats causing severe societal disruptions, few argue against being prepared. So how are leading governments getting ready for inevitable cyber emergencies?

January 25, 2015

New Resolutions: Seven Team Building Actions for Government Leaders

As you think about resolutions for the coming year, or the next four years in government, don't forget your people. Here are seven important actions to consider.

January 19, 2015

State of the Union: Ready for bipartisan cyber action

This should be the year that significant bipartisan progress is made on cybersecurity legislation, with new laws set to pass on issues ranging from data breach notification to sharing sensitive cyber intelligence between the public and private sectors. In fact, since President Obama and Republican congressional leaders can't agree on much else, cybersecurity action is moving to center stage.

January 11, 2015

Virtual Reality Will Be More Than a Game Changer

The International Consumer Electronics Show (CES) in Las Vegas drew huge crowds again this year, with audiences seeing, touching and enjoying the hottest new gadgets and technology. From cars that drive you to drones that are smart to 4K high-definition TVs, it was all there. But the biggest story of all, may be the virtual reality (VR) revolution. VR tools and devices will transform 21st century IT infrastructure.

January 4, 2015

7 Essential IT Infrastructure Strategies that Customers Need Now

As we begin 2015, what do your customers really need from you? What is your government technology infrastructure plan of action for the coming year? Here are seven must-have strategies for enterprises to enable long-lasting innovation.

December 28, 2014

The Top 15 Security Predictions for 2015

Predictions are everywhere. Most security companies now make them. As I examined 2015 lists and checked them twice, everyone is saying that our online situation will get worse. But how much worse? What surprises await us? Here's what technology experts are saying - along with my naughty and nice labels.

December 21, 2014

2014: The year cyber danger doubled

Cybersecurity stories were more popular than ever in 2014, with the word 'cyber' showing up in front of topics ranging from security to shopping scams to global online attacks. But no matter how we rename, reclassify or reanalyze the data in cyberspace, it is clear that the dollars spent, problems encountered and attention given cyber has virtually doubled in 2014.

December 14, 2014

Despite lower pay, how can successful leaders change culture in government?

Recent reports show that morale is low across the nation for government employees. Are there answers that can help even as public sector pay lags behind the private sector? Here's an example to consider.

December 7, 2014

BYOD Is Everywhere: Wear Your Own Device Is Next

Everyone is bringing their own devices to work. But is sensitive data being secured properly on our smartphones and tablets? Soon, new technology will be worn wherever we go. Is your enterprise preparing for WYOD?

November 30, 2014

Tips to Avoid Holiday Shopping Scams Online

Another Cyber Monday, and more online sales records will be set. What can you do to protect yourself at home and work?

November 22, 2014

Michigan Governor Snyder Releases New Cyber Initiative for Next Four Years

The North American International Cyber Summit was held in Detroit's Cobo Hall on Nov. 16-17, 2014, and Michigan Gov. Rick Snyder unveiled an updated 'Michigan Cyber Initiative 2015.' Here are the details on the event and the new cyber plan that's a model for the nation.

November 16, 2014

Securing The Oil & Natural Gas Industries

What can we learn from the annual American Petroleum Institute (API) Cybersecurity Conference in Houston? Many things, but nothing more important than we are all part of the same cyber ecosystem. We sink or swim together in cyberspace.

November 9, 2014

Interpreting the Election: What Are the Government Security and Technology Impacts?

Back in the spring of 2014, speculation was already growing about the significant impact that technology and cybersecurity might have on the 2014 midterm elections.

November 1, 2014

Protecting Data in Minnesota: State Government Security Leaders Share New Strategies

The government security leadership series continues with another set of CIO/CISO interviews. This week we travel to Minnesota.

October 26, 2014

Can Big Data Stop Ebola?

As the headlines around the world continue to focus on the spreading Ebola health crisis, how can technology help? Effective answers must take advantage of recent advances in big data.

October 19, 2014

Job Change Checklist: Seven Things to Consider Before Elections

Once every four years, most state and local governments go through a multi-month period of major upheaval. Regardless of which political party wins in the November midterm elections, major executive turnover usually occurs at the highest levels of government. This fall and winter is one of those times. How can you prepare?

October 13, 2014

Highlights from the 2014 Wisconsin Cyber Security Summit

Cybersecurity protections in Wisconsin government took another step forward last week with an impressive cyber summit that included Gov. Scott Walker, Maj. Gen. Don Dunbar (the adjutant general in Wisconsin) and security leaders from around the nation and the world.

October 5, 2014

Cyber Security Awareness Month 2014: The Best and Worst of Times

The 11th annual National Cyber Security Awareness Month kicked off on Oct. 1, with perhaps the biggest set of activities ever planned. But on day two of the festivities, a huge JPMorgan Chase security breach stole the headlines.

September 28, 2014

The Secrets of Innovation: Government Leaders Need to Think Like Entrepreneurs

The speaker was Facebook VP Vaughan Smith. "We all know that innovation is key to success, but how do we innovate at Facebook? The first key to innovation is moving fast, very fast," he said.

September 21, 2014

MS-ISAC: Cybersecurity Collaboration Is Needed Now More than Ever

As cyber leaders from across federal, state, local and tribal governments prepare to gather for another annual meeting, the future of government cybersecurity in our local communities now hangs in the balance.

September 14, 2014

Mobile Technology Transforming Global Transportation: Highlights from ITS World Congress & Michigan Digital Summit

There were two very different events this past week in Michigan, but both offered similar messages. The Intelligent Transport System (ITS) World Congress and the Michigan Digital Summit pointed to the radical transformation occurring right now in transportation. There is a paradigm shift occurring using smart transportation systems and mobile technology that enables 'realistic solutions to our global mobility, safety, and environmental challenges.'

September 7, 2014

CIO Solutions Gallery: How Can We Enable Culture Change?

Whether the topic is modernizing health care, attracting retaining the right talent, the role(s) of the Chief Data Officer (or the new Chief Digital Officer), the value of big data or even securing enterprises from insider threats, the answer entails culture change. So how do we begin?

August 31, 2014

Robots are Coming: Even to the Cloud

Just as mobile technology and cloud computing became a normal part of our lives, along comes the next set of disruptive innovations that will radically change the way we work and play. Get ready for robots to appear in virtually every area of life. But just as with the Internet, there will also be a dark side.

August 23, 2014

Play a Game - Get a Job: GCHQ's New Tool to Recruit Cyber Talent

It's time to get in the game. Just as in the 1984 movie 'The Last Starfighter,' being the best at a game could lead to a future that exceeds your wildest imagination. The British Intelligence equivalent to NSA is offering a challenge to play a game, with a great cyber job as the prize for winners.

August 16, 2014

How to be Safe Online Using Passwords - With Another Step

The National Cyber Security Alliance is taking the online safety message to a city near you. A national campaign is spreading the word that multifactor authentication is easy to use and available now — often for free.

August 9, 2014

After Russian hackers breach 1.2 billion records: Where is cybercrime going next?

More cyberdefense action is needed, but many people seem content to hit the snooze button for now. Meanwhile, Black Hat speakers offer some policy advice to help, while smart Americans change passwords - again.

August 3, 2014

Thank you Michigan - For the opportunity and privilege of government service

August 1, 2014, was my last full day as Michigan Government's Chief Security Officer (CSO). As I look back at seventeen years of action-packed public service, I will remember the wonderful people who made it all possible and who served (and continue to serve) our citizens so well.

July 27, 2014

A new cyber exercise: Test your security team's incident response capabilities

The Michigan Cyber Civilian Corps, state and local government cyber analysts and the West Michigan Cyber Security Consortium participated in an attack-defend-respond tabletop exercise in a virtual city called Alphaville, which exists within the Michigan Cyber Range. Here's why it matters to a town near you.

July 20, 2014

Outlook for federal action in cyberspace: Expect new net neutrality rules but no cyber laws anytime soon

As we head into the mid-term elections, what cyber policy action is likely in 2014?

July 12, 2014

Are hacker movies becoming reality?

Recent cyber stories resemble plots from James Bond films. Can you tell the difference?

July 6, 2014

Where Next After Cyberbullying Law Struck Down?

As global online harassment concerns rise, workable solutions seem elusive.

June 29, 2014

Perspectives after the Nebraska Cyber Security Conference: Government leaders share insights

A Spartan fan visits Husker Country to learn about cybersecurity in Lincoln.

June 22, 2014

The Internet of Things (IoT) is taking off in smart directions

Coming IoT growth surge will both utilize and surpass cloud computing's appeal.

June 15, 2014

World Cup infrastructure in Brazil: The good, the bad and the protests

What has Brazil done to improve technology and other infrastructure to prepare to host the world?

June 8, 2014

Building Next Generation Networks

Are you ready to handle big data, more video, new firewalls and an exploding number of mobile devices?

May 31, 2014

Elevating cybersecurity leadership: Perspectives from Montana's CIO and CISO

A look at cyber in "Big Sky Country."

May 25, 2014

Global governments enable mobile payments

Why has our US adoption been so slow?

May 17, 2014

Cyber leaders in government: An interview with the Nevada CIO and CISO

David Gustafson and Chris Ipsen offer experience, vision and proven information security leadership.

May 11, 2014

Work-life balance: Does your career fit your family?

On Mother's Day, it's time to take another look at this complex issue.

May 4, 2014

The identity crisis within social networks

Facebook, Google, LinkedIn and others want to be your trusted data broker

April 27, 2014

Digital Deception: Watch out for click fraud, shady metrics and biased reviews online

Tempting the click is everywhere in cyberspace. Keep asking: Is that really true?

April 19, 2014

Pennsylvania Cyber Leaders Share Insights

CIO and CISO offer the nation best-practices to mitigate cyberthreats.

April 13, 2014

Fixing the Heartbleed Bug is essential: But don't forget Windows XP migration

Security pros are feeling the pressure. Are you ready for another action-packed week?

April 5, 2014

Interviews with top state government security leaders: CIO/CSO profile for Delaware

We can learn from front-line government experts who are 'in the arena.' Delaware is raising the bar for the nation in many areas of cybersecurity.

March 30, 2014

Implementing the Cybersecurity Framework within State and Local Governments

A key NIST Cybersecurity Framework kickoff event was held in Washington DC this week. What happened, what can we learn from the event and what's next?

March 22, 2014

Interviews with top state government security leaders: CIO/CISO profile for Mississippi

I am kicking-off a series of interviews with state and local government CIOs and CISOs from around the country. The goal is simple: To listen to their words and learn from their ideas and actions.

March 16, 2014

Big data analytics versus privacy: How can they both win?

Can these hot trends mix, or are they like oil and water? Can we find middle ground on data? Or, will these two trains collide? Do you feel the tension building yet?

March 9, 2014

Ten Recommendations for Security Awareness Programs

How do we improve the security culture in our organizations? It's time to take another look at what works for security awareness programs.

March 2, 2014

What's next for privacy?

RSA Conference sessions ask: Who can you really trust to protect your data online?

February 21, 2014

What the 2014 RSA Conference means for government: Top things to do

Even if you are not going to California, you still need to pay attention.

February 15, 2014

NIST Cybersecurity Framework: Five reasons why it matters for your infrastructure

This new approach matters more than most people realize.

February 8, 2014

After Target breach: Get ready for credit cards with chips and PINs (or EMV cards)

Yes, federal, state and local governments are impacted.

January 30, 2014

Look to Israel for new cybersecurity ideas, innovation, partnerships and inspiration

CyberTech 2014 demonstrates disruptive tech solutions

January 18, 2014

The 2013 National Infrastructure Protection Plan (NIPP)

Why it matters to a community near you.

January 12, 2014

A mission for big data in government: How hyper-personalization can transform customer service

What do we really do with all that data we collect in government? The answer must be to improve customer service and provide a radical transformation in the way governments interact with residents. Anything less will bring big problems. Here's why.

January 5, 2014

Can computer security be easier? It depends

Quick Pop Quiz: Don't worry, this will be easy.

December 28, 2013

14 Predictions on Government IT for 2014

7 Predictions for optimists and 7 predictions for pessimists for government IT in 2014.

December 22, 2013

More bandwidth please: Why consumer trust is at stake in the battle for control of Internet's pipes

New global fiber, with faster pipes, and end-to-end deliver, owned by tech giants like Google, are a central part of the plan to deliver trust.

December 15, 2013

Reviewing 2013 cyber news: Snowden is the top story

2013 was another eventful year in the brief history of cyberspace - with more online holiday shopping, more spear-phishing, some big government project failures and more virtual surprises than ever before.

December 10, 2013

The Top 2014 Government IT Headache: Windows XP Migration

November 29, 2013

What's next for mobile payments?

A few years back, experts predicted that the smartphone would replace the wallet by now. The trouble is, most of these predictions were way too optimistic.

November 23, 2013

Top five mistakes new IT security leaders make

What traps do new security leaders face? How can they avoid them? Where can they go for help?

November 16, 2013

Black Friday and Cyber Monday: The good, bad and ugly - with tips to help online

Everyone loves a deal. And geeks, nerds, government technology staff and cyber pros especially like deals on new technology.

November 10, 2013

Five reasons security is back as the top CIO priority

A familiar hot topic is back in the #1 priority slot for state CIOs. But why is cybersecurity back at the top of the 'must do' list?

November 3, 2013

Why do many big IT projects fail in government?

As the eyes of the entire nation are focused on whether will regroup and still be successful. Skeptical citizens are raising wider questions on big government IT projects once again.

October 26, 2013

Cybersecurity Industry Set to Grow Tenfold

Everyone knows that IT security is hot around the globe right now. But it's about to get much hotter, according to Richard Stiennon, who was the lunch keynote at the 2013 Michigan Cyber Summit yesterday.

October 23, 2013

Watch the Michigan Cyber Summit Live

The 2013 Michigan Cyber Summit is Friday, October 25. You can watch it live on the Internet or access sessions on-demand after the event.

October 20, 2013

State CIOs answer questions on cybersecurity and disaster recovery (DR)

What do state government Chief Information Officers (CIOs) believe are the greatest enterprise risks in 2013?

October 12, 2013

Data Leakage: Rogue IT problems and solutions

Is rogue IT threatening to cause a major breach?

October 5, 2013

Unintended consequences: The government shutdown is hitting home in surprising ways

From home mortgages to university grants to interns enhancing their career prospects, the federal government shutdown of 2013 is hitting home - and hitting hard.

September 29, 2013

Governors Release Compelling Cyber Roadmap for States

The NGA released a new compelling strategy paper called Act and Adjust: A Call to Action for Governors for Cybersecurity.

September 22, 2013

October Cybersecurity Awareness Month: Boom or Shutdown Bust?

Another National Cyber Security Awareness Month (NCSAM) begins on October 1, 2013, and this could be the best or one of the worst ever. This is why...

September 14, 2013

Cybersecurity intelligence and new legislation: What's next?

The Intelligence and National Security Alliance (INSA) organization just held an excellent summit on CSPAN that is worth a second look.

September 9, 2013

Full Inbox: How spam is making a comeback

Spam is back. But this new spam is harder to deal with. Here are some tips to help.

September 1, 2013

'Major cyber event' coming, says Secretary Napolitano

Outgoing Secretary of Homeland Security Janet Napolitano warned that a major cyber attack is coming

August 26, 2013

Dreaming big on new technology: Future or fantasy?

There have been a number of futuristic technology ventures recently announced that are either visionary game-changers or a huge waste of money.

August 18, 2013

Blackout 2003: Governments Are Still Responding Ten Years Later

Where were you when the lights went out in 2003?

August 12, 2013

Tracking by Advertisers Depends on Trust

How much tracking by advertisers is ok? The answer relies on trust...

August 4, 2013

Michigan Governor Snyder Leads by Example on Cyber Awareness Training

"And my challenge to each of you is to take the cyber awareness training... like me..."

July 28, 2013

How to Strengthen Public-Private Partnerships on Cyber

But how do we take these vital security goals to the next level? What are the desired outcomes and corresponding actions required to strengthen our mutual cyber defenses? Where do you start?

July 21, 2013

No Service: When the Internet goes down on vacation

No service? My Verizon connection has great all week why now? Something was wrong.

July 15, 2013

What is the next big thing in technology?

Enquiring minds typically want to know: What is the next big thing in technology? The nice thing about that question is that you can go almost anywhere with the answer.

July 7, 2013

Will stronger EU penalties deter cybercrime?

Early this week the European Union (EU) mandated national maximum sentences of at least two years in prison for attempting to illegally access information systems. Will these tougher penalties deter cybercrime?

June 29, 2013

Insider Threats Take Center Stage

Are insiders or outsiders the greatest IT threat to enterprise security? Lately, the pendulum seems to be swinging towards the insider threat.

June 24, 2013

An Interview with Teri Takai on FirstNet

Ms. Teresa M. (Teri) Takai, who is the CIO for the United States Department of Defense (DoD), has been an exceptional leader in government for more than a decade. She served as state government CIO in both Michigan and California before joining DoD as CIO in 2010. Ms. Takai was appointed to the FirstNet Board of Directors in August 2012.

June 17, 2013

Free BYOD Webinar: Keeping Your Data Safe in a Mobile World

There is a free webinar coming up on the topic of BYOD. The online event will be on Tuesday, June 18, at 2 PM (EST).

June 16, 2013

Edward Snowden is No Dietrich Bonhoeffer

Do the ends justify the means in the case of Edward Snowden disclosing classified NSA secrets to the world? I think not.

June 9, 2013

How to decipher NSA data mining: Examine capabilities and intentions

The news media this week was full of articles describing the U.S. government's role in gathering, mining and analyzing big data from nine leading U.S. Internet companies in order to stop terrorism. Where is this capability going?

June 3, 2013

States' top cyber challenge remains spear phishing

Yes, spear phishing is hot all over the USA - very hot. In fact, this threat may be #1 on the list.

April 21, 2013

After Boston: Relief, Thanks, Questions and Early Lessons

After the unprecedented events of that took place in and around Boston last week, where are we now and where are we going?

April 16, 2013

BYOD for You: New Guidebook for Employees to Bring Your Own Device

I am excited to announce the release of my new eBook on the hot topic of mobile technology and specifically bringing your own device to work (BYOD).

March 9, 2013

The Top 100 Most Innovative Infrastructure Projects in the World

What are the top infrastructure projects in the world? Why were they chosen? What projects are hot in North America? How is cloud computing changing the way business in conducted?

January 14, 2013

EU report says cyber attacks target trust: From identities to infrastructure

The European Network and Information Security Agency (ENISA), which is a part of the European Union (EU), recently issued a report that describes the current global cyber threat landscape - including infrastructure.

December 23, 2012

After Newtown: Should Government Security Also Change?

As we head into the heart of the holiday season, our thoughts and prayers still turn towards the families and devastated communities following the horrible events in Newtown, Connecticut, on December 14, 2012.

December 9, 2012

Cooperative Purchasing: WSCA Joining Forces with NASPO Makes a Powerful Contract Team

Ever since the Western States Contracting Alliance (WSCA) was formed in the October 1993 by the state purchasing directors from fifteen states, governments have been saving millions of dollars through cooperative purchasing.

October 18, 2012

Will Patch Tuesday Ever End?

Patch Tuesday is just around the corner, and I feel an urge to rant.

September 4, 2012

Should governments target users with online ads?

I noticed ads showing up all over the place asking me to come back to their websites. Whether I was checking baseball scores at ESPN, doing a Google maps search for driving directions or researching a cybersecurity article at various tech websites, the computer browser was beckoning me to return and buy plane tickets, with targeted ads asking me questions. Will governments be next to use targeted ads online?

August 4, 2012

India Suffers Worst Power Outage in History: What Can We Learn?

Suddenly, without warning, no power. The blackout spreads. The grid goes down. What can we learn from this?

July 14, 2012

Putting a Defensible Deletion Strategy in Place: An Interview with Jim McGann

e-Discovery, information management and the legal aspects associated with enterprise data are hot topics for technology leaders to address with their business customers. But what information governance strategies are legally defensible? What compliance approaches work best in the long run? How can enterprises reduce risk when they save or delete data?

April 14, 2012

Titanic Mistakes: Five Pragmatic Lessons from Spectacular Technology Failures

Everyone is talking about the sinking of the Titanic and they should be. Here are five lessons for technology and security professionals from the sinking of the Titanic ...

October 22, 2011

Weatherford an Excellent Choice for DHS Deputy Undersecretary for Cybersecurity

Mark Weatherford has been named as the new deputy undersecretary for cybersecurity at the Department of Homeland Security (DHS). Mark is a thoughtful executive who has both military service and hands-on experience dealing with every aspect of our cyber ecosystem. I am confident that he is the right person for this job as we head into 2012.

October 19, 2011

What Should Get Cut Out of Technology Budgets?

There have been several recent articles and reports that offer ways to save Information Technology (IT) dollars. The lists of potential cuts are worth reviewing, but I urge some caution as well.

October 8, 2011

A New Call to Action - Backstage at the Michigan Cyber Summit

Governor Snyder quickly raised the bar: "If people walk away tomorrow saying that we had a nice conference with good speakers, we will have failed. We need everyone walking away saying that it is time to act now on cyber whatever their role."

September 24, 2011

Career Moves: All Roads Lead to Security

As reported by Government Technology Magazine last week, Michigan is merging physical and cyber security. I will be moving to the newly created role of Michigan Chief Security Officer (CSO) in October. The reaction from my friends and colleagues from around the country has been all over the map ranging from Great move to Are you really ok with this?

September 5, 2011

Why Computer Geeks Need Sports

Where did you first learn what it means to out-hustle the competition? How did you develop that strong will to win? When was the first time you worked hard with teammates to accomplish a goal? For many readers, the answer is likely to be playing sports.

August 15, 2011

Consolidating Data Centers: The New Normal in Government

Governments across North America are now consolidating data centers at an unprecedented pace. This is not just talk, but real action is (finally) occurring.

July 31, 2011

Anonymous Hackers Continue Assault: ManTech A New Victim

The string of major cyber hacking attacks continued this week, with ManTech International reportedly being the latest company hit. What's to be done?

July 16, 2011

Can Crowdsourcing Predict the Future? Forecasting Ace Will Test if Perception is Reality

Going Back to the Future may no longer be just for the movies. The intelligence community has launched a new project which attempts to predict what will happen next by using crowdsourcing techniques.

July 3, 2011

ICT Infrastructure: Where Can You Find Innovative Ideas That Work?

Where do you get your blog and/or article ideas? I'm often asked that question. Or colleagues want to know: What are the top ten websites you turn to in order to gauge innovative technology trends?

June 12, 2011

What is a healthy cyber ecosystem?

Sometimes we come across a new word or phrase that is not only different, but intriguing. Which brings me to the topic of today's blog: What is a healthy cyber ecosystem?

May 14, 2011

Digital Wallets: The Next Big Thing?

I was recently asked: What is the next big thing in technology?

April 23, 2011

Amazon Instability Shakes the Cloud: What's Next?

Youre never as good as you look when you're winning, and never as bad as you look when you're losing. I think that adage applies beyond sports to many aspects of life and business including the management of computer operations connected to the global Internet in 2011.

March 27, 2011

Why FedRAMP Matters to a Government Cloud Near You

What is FedRAMP? How does it help with cloud-computing environments? Can we use it here in our state? I expect these questions will be asked across America over the next few years in the halls of state and local governments.

March 20, 2011

Browser Battle Stays Hot: Microsoft IE9 is Latest Entry

Microsoft released the new Internet Explorer (IE) 9 this past week, and government enterprises across the world now have another important decision to make.

March 12, 2011

Helping Japan Recover - Governments Join Emergency Effort

As Japan strives to recovers from the devastating earthquake and tsunamis, global governments are sending aid in a variety of forms.

February 26, 2011

Cyber-Security Action on National Governors Association (NGA) Meeting Agenda

As state leaders gather in Washington, D.C., this weekend for the 2011 National Governors Association (NGA) Winter Meeting, one topic on the agenda is cyber-security. Experts in the field will be addressing questions like: What threats in cyber-space do we now face? What are the potential ramifications of these cyber-threats? What steps can governments take now?

February 12, 2011

President Obama Promotes Broadband: Northern Michigan WiMax Solution Showcased

Egyptian democracy and high-speed Internet are not topics that typically go together, but they were both highlighted during President Obama’s speech this week in Marquette, Michigan.

December 29, 2010

Government IT Trends to Watch in 2011

It’s that time of year when everyone seems to be recapping 2010 and making technology predictions for 2011. Here are my favorite predictions and some important trends to watch regarding government technology infrastructures for 2011.

December 19, 2010

Cloud First Policy -- What Does It Really Mean?

The Federal Government has issued a cloud first policy as a part of the Office of Management and Budget s 25-point plan to reform federal information technology management. What does it mean for state and local governments?

December 4, 2010

Innovative RFPs: Back to the Requirements

It s not in the contract. We hear these words every day in government. The challenge is huge: To be innovative in our RFPs or Invitations to Bid (ITBs) and still be efficient.

November 21, 2010

Will States Adopt Federal IT Management Changes?

The US Office of Management & Budget (OMB) will be implementing fundamental changes that “entail structural changes in how programs are funded, staffed and managed.” The plans call for a “cloud-first” policy which boosts the use of government cloud computing for new systems.

November 5, 2010

Transitioning to 2011 Priorities

There are many ramifications from the state and local government election results this week, such as this article which highlights new Governors to bring big turnover of State CIOs. So what should current (or prospective) government technology professionals be doing now to prepare for 2011?

October 23, 2010

Learning from Mistakes and Being Off Balance on Purpose

Our Michigan Digital Summit was held this past week, and the opening keynote was truly different in a fun way.

October 9, 2010

Mobile Device Management - More Smartphones Mean More Questions for CxOs

What is clear is that the battle for mobile apps is heating up, and the mobile OS space has moved up to become a core issue for CxOs over the next few years.

September 30, 2010

NASCIO Conference Day 3

Day three at the NASCIO conference began with a keynote session led by Thornton May, who is an IT Futurist, Executive Director and Dean at the IT leadership Academy and Author of The New Know: Innovation Powered by Analytics.

September 28, 2010

NASCIO Annual Conference Day 1

The opening keynote by best-selling author Don Yaeger was inspiring and funny.

September 19, 2010

Internet Explorer 9 Beta Is Here --Time to Start Testing?

Microsoft released the new Internet Explorer 9 (IE 9) beta web browser this past week, and the initial reviews from technology critics and even competitors like Google are positive.

September 6, 2010

Virginia: We're With You

There have been quite a few headlines lately about the current challenges facing Virginia's government technology infrastructure . From this IEEE Spectrum article, to Computerworld in ...

August 24, 2010

Intel is Buying McAfee: What's Next?

Everyone's talking about Intel's pending acquisition of McAfee for $7.7 billion. The list of questions is long. Did they pay too much - or too little? ...

August 15, 2010

New Cloud Computing Offerings for Government: Yes, They Are Game-Changers

  Are recent announcements of product offerings from Google, Microsoft and others going to fundamentally change government technology service delivery?  Has the long ...

July 30, 2010

Should Governments Join Banks in Seeking Customers' Help Online?

"We need your help to stop online thieves."  This surprising message from many banks to their customer base is becoming more popular as online ...

July 18, 2010

Too Much eMail? New Survey Results Say Yes

  How much email is too much? New survey results from Harris Interactive found that 50 emails a day may be the breaking point for employees. ...

July 5, 2010

Social networks can redefine "guilty by association"

Earlier this week I received an email from an out of state friend and respected colleague who I haven't heard from in a while. He ...

June 21, 2010

Personal Privacy at Work: Supreme Court Reinforces Status Quo

In a unanimous decision last week, the US Supreme Court rejected the privacy claims of an employee who was texting using employer-provided equipment.  According ...

June 13, 2010

New Mobile Opportunities with Key Fobs

Imagine this:  " A motorist still at the office can use a cell phone to remotely start his car or truck, adjust the temperature, confirm ...

June 1, 2010

vGov - A New Virtual World for Government

 Move over Second Life , a new virtual world is being created for the federal government called vGov. According to Government Computer News: "The ...

May 17, 2010

Free Cloud Storage through the Back Door?

Try typing "free storage" into a Google search, and you'll get almost 47 million results. Here are a few highlights: offers: "2GB, Absolutely Free ...

May 8, 2010

NASCIO Midyear Conference Recap

The National Association of State CIOs (NASCIO) Midyear Conference for 2010 was held during the last week of April in Baltimore.  The attendance was the ...

April 24, 2010

Enforcing Enterprise Standards: Who, What, When, Where and How?

Since posting a blog on the Apple iPad's effect on government standards a few weeks back, I've received several questions from around the country regarding ...

April 12, 2010

Tough Press Lately for Cloud Computing

There's been some tough press lately for cloud computing. Recent conferences on the topic have turned more negative as very high expectations are slow to ...

April 4, 2010

iPad versus Enterprise Standards: Who Wins?

iPad fever is here! On a weekend that celebrates Easter, the NCAA Final Four and record warm temperatures over half the country, everyone seems to ...

April 2, 2010

Redefining Enemies: 21st Century Crime Knows No Borders

I was jogging on my treadmill when I saw the breaking news on ABC - Moscow subway bombing just occurred. It was Monday morning, March 29, ...

March 24, 2010

Headlines from Google to Cybercrime take Center Stage

 In my twenty-five years as a security and technology professional, I have never seen so many hot headlines around technology issues. Whether you are ...

March 13, 2010

What's Next for Privacy?

 I read a very interesting CNET article yesterday entitled, "Why no one cares about privacy anymore." I urge you to take five ...

March 1, 2010

Action Required: End Coming for Windows 2000

Microsoft is warning that the extended support phase is ending for Windows 2000 (server and client), on July 13, 2010 .  In addition, other products with lapsing service ...

January 11, 2010

National Broadband Plan Delayed But Coming Soon

The Federal Communications Commission (FCC) Chairman Julius Genachowski has asked congressional leaders for more time to deliver the much anticipated National Broadband Plan, ...

January 4, 2010

Watch Out - the Vooks are Coming!

What's around the corner for 2010? What new invention will be the next iPhone, iPod or blackberry? Are there any hot ...

December 28, 2009

Remembering the First Decade

 As we approach a new decade in 2010, my mind instinctively goes back in time and scans the past decade.  My thoughts easily jump ...

December 21, 2009

Effectively Deploying Wireless LANs

Wireless Local Area Networks (LANs) have been around for years, but how can state and local governments manage wireless networks efficiently and effectively from an ...

December 13, 2009

Learning from Funny Conference Calls

A funny thing happened on my way to work yesterday. Actually, the situation was pretty frustrating, and there were a few lessons learned ...

December 5, 2009

Are Deeper Budget Cuts Coming?

 Are deeper budget cuts coming for struggling state and local governments? After a year filled with tough news regarding furlough days and more belt ...

November 30, 2009

Web Sites Struggle on Black Friday: Cyber Monday is Next

 Technology directors around the nation were watching the weekend news very closely for events regarding online sales on Black Friday (the ...

November 25, 2009

Giving Thanks At Work

How do you give thanks at work?   One USA Today headline this morning read, "The spirit of the season: Be thankful, spend less."   ...

November 20, 2009

My Take on NASCIO's Top 2010 Priorities

The National Association of State CIOs (NASCIO) has again polled state CIOs to determine what's hot and what's not as we head into&...

November 13, 2009

New Cyber Security Technology Alliance Points the Way

Lockheed Martin and thirteen other leading technology providers announced the formation of a new cyber security technology alliance yesterday. The announcement took place ...

November 1, 2009

NASCIO Best Practice Submissions Worth Reading

 The National Association of State Chief Information Officers (NASCIO) released their list of best practices at their annual conference in Austin, Texas last week. ...

October 27, 2009

Citizen Satisfaction with Federal Websites Surges

The University of Michigan released a report today rating and ranking 104 federal government websites in terms of how well the satisfy citizens. The report is ...

October 26, 2009

Should Governments Move to Windows 7, Linux or Wait?

 What's the best strategy regarding upgrades to your desktop and netbook operating systems? Should governments move to Windows 7, Linux or wait for Google's ...

October 19, 2009

Three Tools for Success: From Ironman Triathlon to Technology

 This past week we held the annual Michigan Digital Government Summit in Lansing. Our opening keynote was presented by Mark Allen, six ...

October 4, 2009

Are Google Outages Becoming a Serious Problem?

 It was Saturday morning, October 3, 2009, and I was trying to log into my gmail (Google mail) account about 7:45 AM (EST). After typing in ...

September 28, 2009

Don't Neglect Identity in Your Government Cloud

 Got any calls lately from vendors who want to share their new cloud computing strategy? I certainly have - and from some unlikely sources. ...

September 22, 2009

Out of Africa: Government Technology is a Global Theme

 I just returned from a nine day trip to South Africa where I was one of the keynote speakers during&...

September 7, 2009

Data Storage Market Decline Brings Opportunities

    EMC continues to lead IBM, Dell and HP in the external disk storage systems market, but worldwide revenue declined by 18.7% from the ...

August 30, 2009

Kundra Addresses Architecture, Procurement and Partnerships

 In a recent interview with Government Computer News (GCN), Federal CIO Vivek Kundra revealed some very interesting perspectives regarding the need to upgrade technology ...

August 17, 2009

Time to Disconnect? eMail and Vacation

Do you ever struggle with balancing work and family time? I certainly do. Turning off a Blackberry can be hard - even on vacation. No ...

August 3, 2009

Social Networking: Should We Ban or Expand at Work?

  Every few weeks I visit a few of the federal government technology websites like Government Computer News or Federal Computer Week to see ...

July 27, 2009

Marketing Hype: Dealing with Email, Phone and Other Advertising Tricks

  A few times a year I feel the need to rant. This blog entry is one of those times, and the topic is dealing ...

July 20, 2009

Move Over Real ID: Here Comes PASS ID

  After a revolt over cost, timelines and a host of other difficult issues, the original "Real ID" appears dead. Secretary Napolitano testified ...

July 11, 2009

Hard Savings Now

  As our national and local economies continue to struggle, managing a technology budget is getting increasingly difficult. There are many unknowns as we ...

July 3, 2009

Stimulus Will Test Governments and Governance

The race has begun. Across America, state and local governments, private sector infrastructure providers, libraries, universities, non-profit groups, school districts and more are all ...

June 26, 2009

Is It Morning Or Evening For Cloud Computing?

 Over the past few weeks, I've dedicated significant time and energy to learning more about the latest trends in cloud ...

June 19, 2009

Technology Training in Tough Times: New Ideas to Help

  A few months ago we held a one day management offsite which included some inspiring words from the top, a great (but ...

June 14, 2009

Broadband Collaboration: Don't Forget the Libraries

I was sitting in the back of the auditorium inside the Michigan State University's Kellogg Center in East Lansing. The event was the Michigan ...

June 7, 2009

Critical Infrastructure Protection: Are We at a Cyber Crossroads?

Are we truly at a significant crossroads in the protection of our Nation's critical infrastructure? More specifically, will the cross-sector cyber infrastructure ...

May 24, 2009

Honolulu's Internet Vote Worked: The Wave of the Future?

The nation's first all-digital election was deemed a success by Honolulu's city officials over the weekend. According to the Associated Press: "Some 115,000 voters in Honolulu's ...

May 17, 2009

How Insourcing Jobs Can Save Dollars

There have been quite a few articles about insourcing over the past few months. As expected, this buzz has sparked another debate about ...

May 6, 2009

Flu Response: The Capacity Dilemma

To buy or not to buy (more telework capacity) - that is the question during an epidemic. As the H1N1 flu situation evolved rapidly ...

April 26, 2009

Government CTO Summit: Data Center Trends Emerge

Government Technology Magazine hosted an invitation only CTO Summit for government CIOs and CTOs on April 14-15.  This year's focus was "Data ...

April 18, 2009

The Wide World of IT Infrastructure

Growing up, I used to love to watch ABCs Wide World of Sports. I'll never forget that famous line from Jim McKay: "Travelling the world ...

E.REPUBLIC Platforms & Programs