|
| 1 | +<?xml version="1.0" encoding="UTF-8"?> |
| 2 | +<rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"> |
| 3 | + <channel> |
| 4 | + <title>Lohrmann on Cybersecurity</title> |
| 5 | + <link>https://www.govtech.com/blogs/lohrmann-on-cybersecurity</link> |
| 6 | + <description>Lohrmann on Cybersecurity</description> |
| 7 | + <language>en-US</language> |
| 8 | + <lastBuildDate>Sun, 05 Apr 2026 09:54:00 GMT</lastBuildDate> |
| 9 | + <atom:link href="https://www.govtech.com/blogs/lohrmann-on-cybersecurity.rss" type="application/rss+xml" rel="self" /> |
| 10 | + <item> |
| 11 | + <title>Post-Quantum Cryptography: Moving From Awareness to Execution</title> |
| 12 | + <link>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/post-quantum-cryptography-moving-from-awareness-to-execution</link> |
| 13 | + <description>Google recently released important research that moves Q-Day — the day quantum computers will be able to “break the Internet” — up to 2029. How should enterprises secure their systems?</description> |
| 14 | + <pubDate>Sun, 05 Apr 2026 09:54:00 GMT</pubDate> |
| 15 | + <guid>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/post-quantum-cryptography-moving-from-awareness-to-execution</guid> |
| 16 | + </item> |
| 17 | + <item> |
| 18 | + <title>RSAC 2026 Highlights: From Agentic AI to Active Defense</title> |
| 19 | + <link>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/rsac-2026-highlights-from-agentic-ai-to-active-defense</link> |
| 20 | + <description>How can enterprises scale cyber defenses for the coming agentic workforce? What are the top cyber trends and challenges flowing from our new normal? Let’s explore through an RSAC lens.</description> |
| 21 | + <pubDate>Sun, 29 Mar 2026 09:30:00 GMT</pubDate> |
| 22 | + <guid>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/rsac-2026-highlights-from-agentic-ai-to-active-defense</guid> |
| 23 | + </item> |
| 24 | + <item> |
| 25 | + <title>What Is Physical AI, and What Does It Mean for Government?</title> |
| 26 | + <link>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/what-is-physical-ai-and-what-does-it-mean-for-government</link> |
| 27 | + <description>From Davos insights to state readiness, let‘s explore how robotics and sensors are moving artificial intelligence into the physical world.</description> |
| 28 | + <pubDate>Sun, 22 Mar 2026 09:30:00 GMT</pubDate> |
| 29 | + <guid>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/what-is-physical-ai-and-what-does-it-mean-for-government</guid> |
| 30 | + </item> |
| 31 | + <item> |
| 32 | + <title>New Federal Strategies, Rising Risk From Iran Top Cyber Themes</title> |
| 33 | + <link>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/new-federal-strategies-rising-risk-from-iran-top-cyber-themes</link> |
| 34 | + <description>When cybersecurity experts from the public and private sectors gathered this week, AI and critical infrastructure took a back seat to frontline defense in light of recent international headlines.</description> |
| 35 | + <pubDate>Sun, 15 Mar 2026 09:57:00 GMT</pubDate> |
| 36 | + <guid>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/new-federal-strategies-rising-risk-from-iran-top-cyber-themes</guid> |
| 37 | + </item> |
| 38 | + <item> |
| 39 | + <title>Securing Critical Infrastructure in a Time of War</title> |
| 40 | + <link>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/securing-critical-infrastructure-in-a-time-of-war</link> |
| 41 | + <description>A deep dive into Iranian cyber warfare and actionable defenses for network operators.</description> |
| 42 | + <pubDate>Sun, 08 Mar 2026 09:04:00 GMT</pubDate> |
| 43 | + <guid>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/securing-critical-infrastructure-in-a-time-of-war</guid> |
| 44 | + </item> |
| 45 | + <item> |
| 46 | + <title>From Michigan to Silicon Valley: A Conversation With Mohamad Yassine</title> |
| 47 | + <link>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/from-michigan-to-silicon-valley-a-conversation-with-mohamad-yassine</link> |
| 48 | + <description>Lessons on humility, careers, the automotive sector, “cowboy coding” and disrupting with AI from a lifelong innovator.</description> |
| 49 | + <pubDate>Sun, 01 Mar 2026 10:03:00 GMT</pubDate> |
| 50 | + <guid>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/from-michigan-to-silicon-valley-a-conversation-with-mohamad-yassine</guid> |
| 51 | + </item> |
| 52 | + <item> |
| 53 | + <title>Defending Your Castle: Best Practices for Smart Home Security</title> |
| 54 | + <link>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/defending-your-castle-best-practices-for-smart-home-security</link> |
| 55 | + <description>Some ways to master the essential tools to protect your privacy without sacrificing the convenience of modern smart technology.</description> |
| 56 | + <pubDate>Sun, 22 Feb 2026 10:28:00 GMT</pubDate> |
| 57 | + <guid>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/defending-your-castle-best-practices-for-smart-home-security</guid> |
| 58 | + </item> |
| 59 | + <item> |
| 60 | + <title>Your Smart Home Is Watching You: Privacy in the Age of AI Robots</title> |
| 61 | + <link>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/your-smart-home-is-watching-you-privacy-in-the-age-of-ai-robots</link> |
| 62 | + <description>From compromised TVs to AI-powered house chores, exploring the evolving global threats and why human-centric security matters more than ever.</description> |
| 63 | + <pubDate>Sun, 15 Feb 2026 10:02:00 GMT</pubDate> |
| 64 | + <guid>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/your-smart-home-is-watching-you-privacy-in-the-age-of-ai-robots</guid> |
| 65 | + </item> |
| 66 | + <item> |
| 67 | + <title>How Global Power Struggles Are Rewriting Cyber Defense</title> |
| 68 | + <link>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/how-global-power-struggles-are-rewriting-cyber-defense</link> |
| 69 | + <description>Navigating insights from the World Economic Forum’s meeting at Davos on AI-driven threats, the push for digital sovereignty and the weaponization of critical global infrastructure.</description> |
| 70 | + <pubDate>Sun, 08 Feb 2026 10:02:00 GMT</pubDate> |
| 71 | + <guid>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/how-global-power-struggles-are-rewriting-cyber-defense</guid> |
| 72 | + </item> |
| 73 | + <item> |
| 74 | + <title>After TikTok: Navigating the Complex Web of Foreign Tech Bans</title> |
| 75 | + <link>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/after-tiktok-navigating-the-complex-web-of-foreign-tech-bans</link> |
| 76 | + <description>As federal and state governments extend their lists of banned foreign technologies, where is this trend heading next? Is your home network safe for work use?</description> |
| 77 | + <pubDate>Sun, 01 Feb 2026 10:46:00 GMT</pubDate> |
| 78 | + <guid>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/after-tiktok-navigating-the-complex-web-of-foreign-tech-bans</guid> |
| 79 | + </item> |
| 80 | + </channel> |
| 81 | +</rss> |
0 commit comments