Lohrmann on Cybersecurity
We’ve been hearing about upcoming breakthroughs with quantum computing technology for several years, so what’s the latest from around the world?
More Blog Posts
Criminals are using stolen information to imitate the police and scam both companies and individuals. Here’s what you need to know.
Where next for supply chain disruptions? How will this impact technology projects and plans? Let’s explore.
What do hackers really do? How do they do it? To answer these questions, many people turn to movies to learn and be entertained. Hacker’s Movie Guide by Steve Morgan and Connor Morgan can help explore your options.
How can public-sector CISOs navigate the complicated issues surrounding budgets? Through good times and bad, these ideas can help.
The Fast Identity Online Alliance (FIDO) offers a growing list of ways to authenticate users with a goal of reducing passwords. But why is it needed? How does it work? Where is this technology heading?
How bad was cyber crime in 2021? What are the projections for the next few years? More important, what can you do about it?
What have we learned so far regarding cybersecurity from the Russia-Ukraine war and related cyber incidents around the world? Let’s explore.
Cyber insurance is only getting more expensive, and the market is changing dramatically, with more changes to come. So what trends will drive adoption, rates and the wider future of cyber insurance?
New mandated reporting of major cyber incidents for all owners and operators of U.S. critical infrastructure seems closer than ever, thanks to new bills that are supported by the White House.
Vitaliy Panych, the California chief information security officer, discusses cyber defenses and government strategic plans, plus his his career and tech priorities.
Some global experts are predicting a significant cyber attack against U.S. and UK critical infrastructure if Russia invades Ukraine. Whether it happens or not, is your organization prepared for this scenario?