Lohrmann on Cybersecurity
-
How can we describe the past year in cybersecurity? No doubt, AI was front and center in so many conversations, and now there’s no going back. Here’s why.
-
The “2025 ISC2 Cybersecurity Workforce Study” was just released, and eye-opening cybersecurity trends are developing that are worth close attention. Let’s explore.
More Blog Posts
-
Fake news is now headline news. Add in fake apps and fake websites, and governments have a huge credibility problem. What can the public sector do? Let’s explore what you can do for real.
-
What's hot right now in cyber? I asked four leading state government chief information security officers (CISOs) about emerging cyberthreats, their state’s top cyberproject priorities for the coming year and for their views on the future outlook for cybersecurity executives. Here’s what they said.
-
What has President Trump already said and done regarding cybersecurity? How should our 45th president address our many online problems at home and abroad? Why am I more optimistic than most commentators about our new leader’s pragmatic approach to cyber? Here’s why.
-
The 2016 U.S. presidential election shined a light on outdated election technology. So what steps must be taken and what technology upgrades are needed to restore the public trust in how we select our government leaders? Going further, how can all government service kiosks be made more secure and reliable? Let’s explore.
-
What cybersecurity blog posts were most popular in calendar year 2016? The numbers don’t lie, and the metrics tell us what readers liked, and shared, and commented on, and viewed the most in the past year.
-
What will happen in 2017? Whether you prefer to call them cybersecurity forecasts, online risk trends or security predictions, the answers are similar. Here’s a roundup of what our top industry experts, security companies and tech magazines are saying about the year ahead — and what you can do to prepare.
-
In 2016, hacktivists took center stage. Hacktivism disrupted many global causes — providing new online missions with anti-establishment goals that wounded public credibility and trust. Here’s a cyber roundup highlighting major international activities online, and how they impacted news headlines in the past year.
-
As recounts in states wind to a close, courts wrap up their legal cases and electors prepare to assemble to formally declare Donald Trump the next president of the United States, what lessons have we learned from the 2016 recount process?
-
What is a formal ‘vulnerability disclosure program,’ and why is it needed in a government near you? Watch this CSPAN panel discussion and learn.
-
With suspicions of hacking, Jill Stein is asking for a recount of the votes cast in Wisconsin, Pennsylvania and Michigan. This is a bad idea. Here are 10 reasons why.
-
After the election, many government technology executives are in a period of transition. Whether you are coming or going or not sure, most public sector IT leaders are now asking: Where next?
-
I'm expecting more surprises from President-elect Trump, this time on cybersecurity policy. Here's why.