Lohrmann on Cybersecurity
-
With the release of Anthropic’s Project Glasswing and Claude Mythos, how should CISOs navigate the arrival of automated exploit chaining, collapsing patch cycles and the inevitable rise of adversarial AI?
-
Google recently released important research that moves Q-Day — the day quantum computers will be able to “break the Internet” — up to 2029. How should enterprises secure their systems?
More Blog Posts
-
Another National Association of State CIOs (NASCIO) Midyear conference has come and gone in 2018. What did we learn and where can we go from here?
-
Another action-packed RSA Conference wrapped up this week in San Francisco. What is clear is that our cybersecurity industry is a work in progress on many levels. Here are some conference highlights and top-notch cybersecurity content to ponder.
-
With technology changing so rapidly all around us, how can we think about the ethical implications of what is now becoming possible? With big data analytics, machine learning and artificial intelligence (AI) growing so fast, can we agree on inappropriate uses? Are privacy regulations even workable? Will hackers just go around the rules? Let’s explore.
-
Technology professionals often have a hard time presenting important online safety topics to the masses. Key ‘cyber hygiene’ messages are usually ignored. Here are some tips to help — and reasons to keep trying.
-
Are the privacy issues at Facebook the tip of a larger iceberg? Who might be next? Will more whistleblowers emerge who reveal client data misuse?
-
After a self-driving Uber SUV fatally struck a pedestrian last weekend in Arizona, global attention is concentrated on the future of autonomous vehicles. Here is a summary of what happened, the public reaction and some of the tough questions that need to be addressed moving forward to build trust.
-
In an unprecedented move this past week, the US CERT revealed details of Russian hacking of U.S. critical infrastructure operators, including energy, nuclear, water, aviation, and critical manufacturing facilities. What was announced and where is this heading next? Most important, how can your public- or private-sector organization respond? Let’s explore.
-
What works in training students to protect enterprises from data breaches? How can experienced cyberpros practice defending their networks from emerging cyberthreats? Where are the right tools, effective processes and hands-on techniques combined to simulate real-world challenges faced from hackers? The answer may be at a cyber range near you. Here’s why the trend is exploding.
-
How reliable and resilient is our nation’s critical energy infrastructure? How must we improve amid growing concerns regarding cyberthreats? What are the greatest vulnerabilities? How are physical threats, natural disasters and cyberthreats to energy being addressed? Let’s explore.
-
Protecting the integrity of elections is a hot topic. From cyberattacks to fake news influencing public opinion to other forms of external manipulation that could undermine democracies, voting security has risen to become a top issue for global governments. Here’s what you need to know and potential next steps for the public and private sectors.
-
President Trump formally unveiled his new infrastructure plan this past week. So what’s in it and where will infrastructure improvements likely go next? Here’s a roundup of coverage, related alternatives and thoughts on next steps.
-
The Multi-State Information Sharing and Analysis Center (MS-ISAC) started a mentoring program in 2012, and this nationwide career-enhancing strategy for security leaders has grown to become stronger than ever. Here are the details on how the mentoring program works and interviews on the benefits with government mentors and mentees. Most important, why you should care and how to get involved.