Lohrmann on Cybersecurity
-
Some ways to master the essential tools to protect your privacy without sacrificing the convenience of modern smart technology.
-
From compromised TVs to AI-powered house chores, exploring the evolving global threats and why human-centric security matters more than ever.
More Blog Posts
-
Regardless of who wins, this presidential election campaign has highlighted a series of data leaks with personal information about candidates that will be remembered far after voting is over. New norms are developing regarding online privacy and radical transparency that question the boundaries of hacker ethics in our globally connected world. Many are asking: Will personal privacy even survive in the years to come?
-
As the public and private sectors struggle to find technology and security professionals with the right talent, skills, integrity, work ethic, perseverance and attitude to excel in the 21st century, I strongly urge you to consider ‘Hiring Our Heroes.’ This effective fellowship program helps military veterans transition into civilian life, and offers so much more. Here’s what you need to know and how your organization can benefit from this outstanding program.
-
The Cloud Security Alliance working group on the Internet of Things (IoT) released new guidance this week for securing the IoT product ecosystem. The 80-plus page guide is titled: 'Designing and Developing Secure IoT Products.' The report offers 13 recommendations to raise the overall security level of IoT products and services.
-
Another massive, headline-grabbing data breach was announced this week from Yahoo. What have we learned, and what wider security industry questions just keep resurfacing?
-
During a keynote session at their annual conference this week in Orlando, the National Association of State CIOs (NASCIO) released their biennial survey results on state cybersecurity. While the overall report trends (compared with the previous three surveys) seemed encouraging, many attendees asked me if the real situation was as positive as the data seemed to imply. Let’s explore the state CISO survey answers and the rest of the story.
-
Even the best customer service organizations in the world make common online and call center mistakes. Public- and private-sector organizations cannot rest on past successes to ensure future client satisfaction. Here’s a simple case study that shows what to do, and not do, regarding people, process and technology.
-
How can a government CISO get executive buy-in to obtain authority, autonomy and budget? What are the keys to success in the public sector? What are examples of important cybersecurity projects that are ongoing in major U.S. cities like Atlanta? Here is an exclusive interview with former Atlanta CISO Taiye Lambo.
-
Steven Fox is a top government cybersecurity expert, Distinguished Fellow with the Ponemon Institute and frequent speaker at top security events all over America. In this exclusive interview, Steven shares several low-tech but sophisticated social engineering techniques that hackers use to gain (unauthorized) privileged access into government systems and large and small company networks. Most important, what can we do to prevent fraud and respond to incidents that do occur?
-
How do you build a 'smart city?' What innovative factors lead to award-winning smarter technology examples to emulate? Which European city is the smartest? Let’s explore.
-
Most experts believe the good guys continue to fall further behind in our global hacker wars. So how did we get to this point in cyberspace? Most important, where can you go for help in this new Wild West online?
-
Do you unplug when you go on vacation? How about placing boundaries or time limits on your children’s screen time? What can be done to help? Is it time to schedule a digital detox?
-
What's happening with millennials in government? Are new strategies needed to attract and retain young people into public-sector jobs? Let's explore.