<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
  <channel>
    <title>Lohrmann on Cybersecurity</title>
    <link>https://www.govtech.com/blogs/lohrmann-on-cybersecurity</link>
    <description>Lohrmann on Cybersecurity</description>
    <language>en-US</language>
    <lastBuildDate>Sun, 26 Apr 2026 09:06:00 GMT</lastBuildDate>
    <atom:link href="https://www.govtech.com/blogs/lohrmann-on-cybersecurity.rss" type="application/rss+xml" rel="self" />
    <item>
      <title>The Great Stay: Why Tech Talent Is Choosing Stability Over Salary</title>
      <link>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/the-great-stay-why-tech-talent-is-choosing-stability-over-salary</link>
      <description>How mass layoffs and economic anxiety have upended the talent war, turning “job hugging” into the public sector’s greatest opportunity to fill open tech positions.</description>
      <pubDate>Sun, 26 Apr 2026 09:06:00 GMT</pubDate>
      <guid>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/the-great-stay-why-tech-talent-is-choosing-stability-over-salary</guid>
    </item>
    <item>
      <title>A History of Global Hacking — and Where It’s Going Next</title>
      <link>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/a-history-of-global-hacking-and-where-its-going-next</link>
      <description>In her new book, &lt;i&gt;Code War: How Nations Hack, Spy, and Shape the Digital Battlefield,&lt;/i&gt; Allie Mellen provides true stories of the current cyber war and, importantly, what might be ahead.</description>
      <pubDate>Sun, 19 Apr 2026 09:44:00 GMT</pubDate>
      <guid>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/a-history-of-global-hacking-and-where-its-going-next</guid>
    </item>
    <item>
      <title>Why Anthropic’s Mythos Is a Systemic Shift for Global Cybersecurity</title>
      <link>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/why-anthropics-mythos-is-a-systemic-shift-for-global-cybersecurity</link>
      <description>With the release of Anthropic’s Project Glasswing and Claude Mythos, how should CISOs navigate the arrival of automated exploit chaining, collapsing patch cycles and the inevitable rise of adversarial AI?</description>
      <pubDate>Sun, 12 Apr 2026 09:12:00 GMT</pubDate>
      <guid>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/why-anthropics-mythos-is-a-systemic-shift-for-global-cybersecurity</guid>
    </item>
    <item>
      <title>Post-Quantum Cryptography: Moving From Awareness to Execution</title>
      <link>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/post-quantum-cryptography-moving-from-awareness-to-execution</link>
      <description>Google recently released important research that moves Q-Day — the day quantum computers will be able to “break the Internet” — up to 2029. How should enterprises secure their systems?</description>
      <pubDate>Sun, 05 Apr 2026 09:54:00 GMT</pubDate>
      <guid>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/post-quantum-cryptography-moving-from-awareness-to-execution</guid>
    </item>
    <item>
      <title>RSAC 2026 Highlights: From Agentic AI to Active Defense</title>
      <link>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/rsac-2026-highlights-from-agentic-ai-to-active-defense</link>
      <description>How can enterprises scale cyber defenses for the coming agentic workforce? What are the top cyber trends and challenges flowing from our new normal? Let’s explore through an RSAC lens.</description>
      <pubDate>Sun, 29 Mar 2026 09:30:00 GMT</pubDate>
      <guid>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/rsac-2026-highlights-from-agentic-ai-to-active-defense</guid>
    </item>
    <item>
      <title>What Is Physical AI, and What Does It Mean for Government?</title>
      <link>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/what-is-physical-ai-and-what-does-it-mean-for-government</link>
      <description>From Davos insights to state readiness, let‘s explore how robotics and sensors are moving artificial intelligence into the physical world.</description>
      <pubDate>Sun, 22 Mar 2026 09:30:00 GMT</pubDate>
      <guid>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/what-is-physical-ai-and-what-does-it-mean-for-government</guid>
    </item>
    <item>
      <title>New Federal Strategies, Rising Risk From Iran Top Cyber Themes</title>
      <link>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/new-federal-strategies-rising-risk-from-iran-top-cyber-themes</link>
      <description>When cybersecurity experts from the public and private sectors gathered this week, AI and critical infrastructure took a back seat to frontline defense in light of recent international headlines.</description>
      <pubDate>Sun, 15 Mar 2026 09:57:00 GMT</pubDate>
      <guid>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/new-federal-strategies-rising-risk-from-iran-top-cyber-themes</guid>
    </item>
    <item>
      <title>Securing Critical Infrastructure in a Time of War</title>
      <link>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/securing-critical-infrastructure-in-a-time-of-war</link>
      <description>A deep dive into Iranian cyber warfare and actionable defenses for network operators.</description>
      <pubDate>Sun, 08 Mar 2026 09:04:00 GMT</pubDate>
      <guid>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/securing-critical-infrastructure-in-a-time-of-war</guid>
    </item>
    <item>
      <title>From Michigan to Silicon Valley: A Conversation With Mohamad Yassine</title>
      <link>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/from-michigan-to-silicon-valley-a-conversation-with-mohamad-yassine</link>
      <description>Lessons on humility, careers, the automotive sector, “cowboy coding” and disrupting with AI from a lifelong innovator.</description>
      <pubDate>Sun, 01 Mar 2026 10:03:00 GMT</pubDate>
      <guid>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/from-michigan-to-silicon-valley-a-conversation-with-mohamad-yassine</guid>
    </item>
    <item>
      <title>Defending Your Castle: Best Practices for Smart Home Security</title>
      <link>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/defending-your-castle-best-practices-for-smart-home-security</link>
      <description>Some ways to master the essential tools to protect your privacy without sacrificing the convenience of modern smart technology.</description>
      <pubDate>Sun, 22 Feb 2026 10:28:00 GMT</pubDate>
      <guid>https://www.govtech.com/blogs/lohrmann-on-cybersecurity/defending-your-castle-best-practices-for-smart-home-security</guid>
    </item>
  </channel>
</rss>
