Lohrmann on Cybersecurity
-
How can we describe the past year in cybersecurity? No doubt, AI was front and center in so many conversations, and now there’s no going back. Here’s why.
-
The “2025 ISC2 Cybersecurity Workforce Study” was just released, and eye-opening cybersecurity trends are developing that are worth close attention. Let’s explore.
More Blog Posts
-
In a mixed economic environment, how are cybersecurity budgets competing among business priorities, and what may be ahead for 2026?
-
The new movie Tron: Ares isn’t just sci-fi entertainment — it’s a mirror for today’s AI risks and realities. What happens when artificial intelligence systems don't work as intended?
-
In his book Comfort Override: Future-Proof Your Life as AI Flips Your World, Ranan Lachman explores how we can prepare and adapt for unprecedented change and offers practical, hands-on help.
-
AI can streamline how government serves residents, but automating bad processes only accelerates frustration. Here's why fixing policies is the first step to successful AI in customer service.
-
As we enter the holiday shopping season, more people are using AI tools and tips to shop for deals and protect themselves online. Here’s how.
-
How can you be a cyber-smart parent? In this interview with Chad Rychlewski, the co-author of a new book, we unpack what family online protection looks like in 2025.
-
NASCIO held their annual conference in Denver this past week, and while many leaders describe difficult budget environments, the opportunities for using AI remain abundant.
-
The Cybersecurity and Infrastructure Security Agency is under new leadership and focus as we enter FY2026. So what are the priorities for the coming year?
-
What is Cybersecurity Maturity Model Certification from the Department of Defense and why should state and local governments care about it? How agencies can leverage funding to grow their security programs.
-
From water systems to the electric grid, critical infrastructure has been under threat for decades. But 2025 cyber attacks against airports are different. Here’s why.
-
Billions of records are breached each year as a result of misconfigured servers, firewalls and other network devices. What can be done? Let’s explore.
-
Is the second Trump administration open to private-sector companies — or non-military or other government agencies — using offensive security against cyber threats?