Lohrmann on Cybersecurity
-
What were the top government technology and cybersecurity blog posts in 2025? The metrics tell us what cybersecurity and technology infrastructure topics were most popular.
-
With AI taking the top spot for 2026 government CIO priorities, what are the next-level questions that leaders must focus on regarding AI projects and trends in the new year?
More Blog Posts
-
The newly updated book, 'Borderless Behavior Analytics — Second Edition: Who's Inside? What're They Doing?' has recently been released. I strongly urge technology, security and business leaders to read this book. Here’s why this second edition is another 'must-read.'
-
Current Tenable Chairman and CEO Amit Yoran’s career is beyond impressive. Yoran is a cybersecurity rock star. In this exclusive interview, we provide a glimpse into his security past, Tenable’s current technology priorities and future cybertrends. His immediate focus: Critical infrastructures are facing daily cyberattacks and our cyberexposure to system vulnerabilities must be an urgent priority.
-
After a family vacation out East, here are some observations, tips and reminders about using your tech devices on the road. How can we enable online security while enjoying family fun at the same time? What advice helps keep data on your personal (and professional) laptops, smartphones and other devices safe at the beach, in airports, visiting hotels and more?
-
What language does your organization use (both internally and externally) to talk about security incident response? Was that recent cyberevent an incident or a data breach or both? How do you know? Who decides on required actions — both formally and informally? Let’s explore.
-
Mike Lettman, the state chief information security officer (CISO) in Arizona, has a wealth of cybersecurity experience across multiple states. In this exclusive interview, Mike discusses what’s hot in his state government cyberefforts and points to what’s next to keep constituent data safe.
-
The No. 1 global sporting event, which only comes around once every four years, is about to begin in Russia. Billions of people are expected to be watching and commenting and clicking on all things football (soccer) over the next month. But with all the fun, and money and attention, there are criminals preparing as well. Let’s explore the FIFA World Cup cyberthreats and what can be done about security.
-
What works (and what generally doesn’t work) to help obtain the needed dollars, staff and other resources for an effective, ongoing, culture-changing, cybersecurity program? Let’s take another look at answers to this important question.
-
GDPR-mania has arrived. With the new European Union (EU) law taking effect on May 25, 2018, the Internet will never be quite the same. Opinions on GDPR are all over the map, and lawsuits have already been filed. Here’s a media roundup on what organizations in the USA and around the world are saying, and doing and planning regarding GDPR.
-
The U.S. National Institute of Standards & Technology (NIST) recently released version 1.1 of the Cybersecurity Framework, and the security industry response is stronger than ever. Here are the facts — along with a front-line expert interview on what public- and private-sector organizations are doing now to plan and implement the new guidance.
-
Top auto industry and government leaders are coming together for an important automotive cybersecurity summit in Detroit. The 2nd Billington Automotive Cybersecurity Summit is set for Aug. 3, 2018.
-
What sets a CISO apart? Or, more broadly, how can we differentiate one tech CxO from another? What standards or metrics can business executives use for evaluating technology and security leaders? Here is my ‘easy-to-use’ but ‘hard-to-excel-at’ formula for grading security and technology leadership performance.
-
Another National Association of State CIOs (NASCIO) Midyear conference has come and gone in 2018. What did we learn and where can we go from here?