Lohrmann on Cybersecurity
-
What were the top government technology and cybersecurity blog posts in 2025? The metrics tell us what cybersecurity and technology infrastructure topics were most popular.
-
With AI taking the top spot for 2026 government CIO priorities, what are the next-level questions that leaders must focus on regarding AI projects and trends in the new year?
More Blog Posts
-
What is a formal ‘vulnerability disclosure program,’ and why is it needed in a government near you? Watch this CSPAN panel discussion and learn.
-
With suspicions of hacking, Jill Stein is asking for a recount of the votes cast in Wisconsin, Pennsylvania and Michigan. This is a bad idea. Here are 10 reasons why.
-
After the election, many government technology executives are in a period of transition. Whether you are coming or going or not sure, most public sector IT leaders are now asking: Where next?
-
I'm expecting more surprises from President-elect Trump, this time on cybersecurity policy. Here's why.
-
Despite reports of rigged elections, vote flipping, election fraud, domestic and foreign hacking and much more, you can trust the counting of the votes in America. Here’s why.
-
After the Mirai botnet was recently used to bring down large portions of cyberspace, there have been new calls for regulating Internet of Things (IoT) devices. Since the voluntary IoT security approach is clearly failing, what can we expect moving forward? Are better standards needed? Should government mandate more security for IoT devices for consumer protection? Let’s explore.
-
Regardless of who wins, this presidential election campaign has highlighted a series of data leaks with personal information about candidates that will be remembered far after voting is over. New norms are developing regarding online privacy and radical transparency that question the boundaries of hacker ethics in our globally connected world. Many are asking: Will personal privacy even survive in the years to come?
-
As the public and private sectors struggle to find technology and security professionals with the right talent, skills, integrity, work ethic, perseverance and attitude to excel in the 21st century, I strongly urge you to consider ‘Hiring Our Heroes.’ This effective fellowship program helps military veterans transition into civilian life, and offers so much more. Here’s what you need to know and how your organization can benefit from this outstanding program.
-
The Cloud Security Alliance working group on the Internet of Things (IoT) released new guidance this week for securing the IoT product ecosystem. The 80-plus page guide is titled: 'Designing and Developing Secure IoT Products.' The report offers 13 recommendations to raise the overall security level of IoT products and services.
-
Another massive, headline-grabbing data breach was announced this week from Yahoo. What have we learned, and what wider security industry questions just keep resurfacing?
-
During a keynote session at their annual conference this week in Orlando, the National Association of State CIOs (NASCIO) released their biennial survey results on state cybersecurity. While the overall report trends (compared with the previous three surveys) seemed encouraging, many attendees asked me if the real situation was as positive as the data seemed to imply. Let’s explore the state CISO survey answers and the rest of the story.
-
Even the best customer service organizations in the world make common online and call center mistakes. Public- and private-sector organizations cannot rest on past successes to ensure future client satisfaction. Here’s a simple case study that shows what to do, and not do, regarding people, process and technology.