Lohrmann on Cybersecurity
-
Navigating insights from the World Economic Forum’s meeting at Davos on AI-driven threats, the push for digital sovereignty and the weaponization of critical global infrastructure.
-
As federal and state governments extend their lists of banned foreign technologies, where is this trend heading next? Is your home network safe for work use?
More Blog Posts
-
The Cybersecurity and Infrastructure Security Agency is launching CISA Learning, a new learning management platform to help with cybersecurity training and much more.
-
Has your smartphone become a listening device? Are your apps gleaning information from your conversations? How can you check and what can you do to regain more privacy? Let’s explore.
-
What changes will President-elect Donald J. Trump implement in his second term regarding homeland security, technology, cybersecurity and more? Let’s explore.
-
Several recent studies highlight what is happening in the public and private sectors regarding artificial intelligence initiatives, along with detailing barriers and cybersecurity challenges to address.
-
ISC2 just released their 2024 cyber workforce report, and the key findings are eye-opening for public-sector employees. Here’s what you need to know.
-
A new report from Auburn University’s McCrary Institute for Cyber and Critical Infrastructure Security provides recommendations for the incoming presidential administration. Here are some report highlights.
-
Sara Snell started her career as an elementary school teacher. Here is her journey to becoming a state government cyber professional.
-
Bad actors often take advantage of natural disasters, and especially hurricanes, in times of crisis. Hurricanes Helene and Milton pose significant new online threats, including misinformation and fraud.
-
The National Association of State CIOs (NASCIO) held its annual conference in New Orleans, La., this past week. Here are some of the highlights, along with some thoughts about what the future holds for state CIOs.
-
As we head toward 2025, are the duties and goals of a chief information security officer achievable? Are CISOs set up for failure? Should position descriptions be changed? Let’s explore.
-
There have been some new updates around airport security and identification. Here’s what you need to know.
-
While the federal government deadline has arrived on implementing a zero-trust cybersecurity model, many state and local governments have committed to zero-trust architecture as well.