Lohrmann on Cybersecurity
-
From compromised TVs to AI-powered house chores, exploring the evolving global threats and why human-centric security matters more than ever.
-
Navigating insights from the World Economic Forum’s meeting at Davos on AI-driven threats, the push for digital sovereignty and the weaponization of critical global infrastructure.
More Blog Posts
-
The 2016 U.S. presidential election shined a light on outdated election technology. So what steps must be taken and what technology upgrades are needed to restore the public trust in how we select our government leaders? Going further, how can all government service kiosks be made more secure and reliable? Let’s explore.
-
What cybersecurity blog posts were most popular in calendar year 2016? The numbers don’t lie, and the metrics tell us what readers liked, and shared, and commented on, and viewed the most in the past year.
-
What will happen in 2017? Whether you prefer to call them cybersecurity forecasts, online risk trends or security predictions, the answers are similar. Here’s a roundup of what our top industry experts, security companies and tech magazines are saying about the year ahead — and what you can do to prepare.
-
In 2016, hacktivists took center stage. Hacktivism disrupted many global causes — providing new online missions with anti-establishment goals that wounded public credibility and trust. Here’s a cyber roundup highlighting major international activities online, and how they impacted news headlines in the past year.
-
As recounts in states wind to a close, courts wrap up their legal cases and electors prepare to assemble to formally declare Donald Trump the next president of the United States, what lessons have we learned from the 2016 recount process?
-
What is a formal ‘vulnerability disclosure program,’ and why is it needed in a government near you? Watch this CSPAN panel discussion and learn.
-
With suspicions of hacking, Jill Stein is asking for a recount of the votes cast in Wisconsin, Pennsylvania and Michigan. This is a bad idea. Here are 10 reasons why.
-
After the election, many government technology executives are in a period of transition. Whether you are coming or going or not sure, most public sector IT leaders are now asking: Where next?
-
I'm expecting more surprises from President-elect Trump, this time on cybersecurity policy. Here's why.
-
Despite reports of rigged elections, vote flipping, election fraud, domestic and foreign hacking and much more, you can trust the counting of the votes in America. Here’s why.
-
After the Mirai botnet was recently used to bring down large portions of cyberspace, there have been new calls for regulating Internet of Things (IoT) devices. Since the voluntary IoT security approach is clearly failing, what can we expect moving forward? Are better standards needed? Should government mandate more security for IoT devices for consumer protection? Let’s explore.
-
Regardless of who wins, this presidential election campaign has highlighted a series of data leaks with personal information about candidates that will be remembered far after voting is over. New norms are developing regarding online privacy and radical transparency that question the boundaries of hacker ethics in our globally connected world. Many are asking: Will personal privacy even survive in the years to come?