Lohrmann on Cybersecurity
Blog Posts
On July 19, 2024, a CrowdStrike software update unleashed mayhem on computer systems at airports, banks and more from Australia to Atlanta. What happened, and what lessons can we take away?
More Blog Posts
Artificial intelligence is yielding unprecedented benefits, battles, opportunities and fears — and advancing faster than ever. What is the latest on the global AI landscape?
The dramatic growth in GenAI and AI adoption is bringing increased demand for energy to power data centers. Where is this heading? How can we navigate a sustainable energy future with exploding technology usage?
As another RSA Conference in San Francisco ended on May 10, 2024, the global impact that cybersecurity and artificial intelligence bring to every area of life has become much more apparent.
The NASCIO Midyear Conference this past week highlighted the good, the bad and the scary of generative AI, as well as the vital importance of the data that states are using to feed large language models.
Where next for the most popular app in the world? President Biden signed a bill that could lead to a nationwide TikTok ban, but will it actually happen? What are the implications?
A new book by Alan Shark offers an excellent guide and an AI road map for state and local governments. He answers basic questions that public-sector leaders are asking in 2024.
Iowa’s Caitlin Clark clearly propelled NCAA women’s basketball viewership. But what do past numbers teach us about future expectations — in both basketball and cyber metrics?
Almost everyone has heard of ChatGPT. But Jeff Brown, CISO for the state of Connecticut, shares his concerns on some of the other “dark side” apps that have emerged with generative AI.
With global cyber threats and other international tensions growing, what scenarios should state and local governments consider when conducting exercises to test their people, processes and technology?
Cybersecurity experts from state and local government, as well as top federal agencies, gathered this week to discuss everything from critical infrastructure attacks to concerns about China. Here are some top takeaways.
In this interview with white hat hacker Mishaal Khan, we learn about open source intelligence gathering and how to hack humans — or not.
Many global cyber teams are analyzing cyber defense gaps now that the NIST Cybersecurity Framework 2.0 has been released. How will this guidance move the protection needle?