Lohrmann on Cybersecurity
-
With the release of Anthropic’s Project Glasswing and Claude Mythos, how should CISOs navigate the arrival of automated exploit chaining, collapsing patch cycles and the inevitable rise of adversarial AI?
-
Google recently released important research that moves Q-Day — the day quantum computers will be able to “break the Internet” — up to 2029. How should enterprises secure their systems?
More Blog Posts
-
Even the best customer service organizations in the world make common online and call center mistakes. Public- and private-sector organizations cannot rest on past successes to ensure future client satisfaction. Here’s a simple case study that shows what to do, and not do, regarding people, process and technology.
-
How can a government CISO get executive buy-in to obtain authority, autonomy and budget? What are the keys to success in the public sector? What are examples of important cybersecurity projects that are ongoing in major U.S. cities like Atlanta? Here is an exclusive interview with former Atlanta CISO Taiye Lambo.
-
Steven Fox is a top government cybersecurity expert, Distinguished Fellow with the Ponemon Institute and frequent speaker at top security events all over America. In this exclusive interview, Steven shares several low-tech but sophisticated social engineering techniques that hackers use to gain (unauthorized) privileged access into government systems and large and small company networks. Most important, what can we do to prevent fraud and respond to incidents that do occur?
-
How do you build a 'smart city?' What innovative factors lead to award-winning smarter technology examples to emulate? Which European city is the smartest? Let’s explore.
-
Most experts believe the good guys continue to fall further behind in our global hacker wars. So how did we get to this point in cyberspace? Most important, where can you go for help in this new Wild West online?
-
Do you unplug when you go on vacation? How about placing boundaries or time limits on your children’s screen time? What can be done to help? Is it time to schedule a digital detox?
-
What's happening with millennials in government? Are new strategies needed to attract and retain young people into public-sector jobs? Let's explore.
-
In 2016, hacktivism has become a mainstream force impacting millions of global lives. ‘Hacking for a cause’ has now become a weapon that transcends far beyond ‘antisocial geek misfit’ boundaries. From the DNC email hack to the Panama Papers, a surge in new hacktivism is now the top anti-establishment online tool for achieving a diverse set of causes around the globe.
-
As the world looks forward to the 2016 Summer Olympic Games in Brazil, a long list of problems and solutions have received media attention. But regardless of what happens in the arenas, is your organization prepared? Here’s a primer on potential online trouble spots and how you can prepare.
-
Top auto industry companies have announced coordinated vulnerability disclosure programs. This use of ‘bug bounties’ to encourage global hackers to help identify security holes points to the future of critical infrastructure protection. Here’s what’s happening now with crowdsourcing vulnerability management, and why the entire cybersecurity industry is taking notice.
-
Over the past few months, several random events got me thinking a lot more about data backups — again. I know, I know — a boring topic that you already dealt with years ago. You are tempted to just move on. But for your own good, please read this.
-
More and more devices are plugging into your government’s corner of the Internet of Things (IoT), but are we truly implementing the right projects in 'smart' ways? Here’s what you need to know about the state of smart cities opportunities along with some potholes to avoid and questions to be answered.