Strengthening the National Focus on Cybersecurity

The latest cybersecurity executive order, issued in June of 2025, aims to streamline past administrations' cybersecurity executive actions and strip mandates seen as overly prescriptive or ideological. It also introduces new guidelines and mandates to strengthen cyber practices within the government and private sector.

Key Updates to Historical Guidance

The order updates sanctioning policies from the Obama administration that allow the government to financially punish people involved in hacking activities that harm U.S. national security. This latest order "limits the application of cyber sanctions only to foreign malicious actors" to prevent the "misuse against domestic political opponents."

Cyber guidance issued in the waning days of the Biden administration encouraged government agencies to ramp up use of digital ID technologies. The latest EO strikes this mandate based on the belief that digital ID could lead to greater fraud and abuse. Continue reading

Balancing AI’s Power with Privacy

Artificial Intelligence (AI) has incredible potential to speed decision-making and unearth connections between data to inform government services and programs. AI is being implemented across government and private industry with very little policy or regulation as to its development or use. In many ways, this lack of oversight is driving exciting innovation, but as this innovation leads to new uses, the risks of infringing on citizen rights and privacy increase.

Peter Parker (Spiderman) was warned, "with great power comes great responsibility." Similarly, AI developers need a voice providing gentle guidance as they figure out how best to use AI's power for good. In the fall of 2022, the White House released the AI Bill of Rights, designed to address concerns about how, without some oversight, AI could lead to discrimination against minority groups and further systemic inequality. Continue reading

Schools Have to Learn the ABCs of Ransomware

Ransomware has traditionally been a practice where cybercriminals encrypt data and demand ransom in exchange for a decryption key. More recently, a growing number of these bad actors threaten to make this information public if they do not get paid. This shift in the practice of ransomware has increased the "attractiveness" of K-12 schools for cyber criminals. Information about children is among the most highly protected data there is, making it more likely ransoms will be paid to keep it private. For this and other reasons, K-12 schools are seeing an increase in ransomware activity. In 2021, there were at least 62 reported ransomware cases as compared to only 11 in 2018. 2021 also saw ransomware as the most common cyber incident for K-12 schools for the first time ever.

What Gets Compromised in a Ransomware Attack?

An incident in 2020 involving Fairfax County, VA Public Schools resulted in employee social security numbers being posted online. Hackers targeting a school district in Allen, Texas emailed parents with threats to expose their childs' personal information if educators did not pay a ransom. Showing the full swing of ransomware impacts from the serious to the mundane, a 2022 attack on the Griggsville-Perry School District in Indiana had many records compromised and leaked including a detention slip from December 2014 for a student who would not stop interrupting his health class. This shows the breadth of access that hackers had to documents and has led many schools to reexamine their file retention policy to reduce the amount of data accessible to bad actors. Continue reading

Security Takes a Leading Role in Acquisition

Recent security breaches via software have made supply chain security a priority across government. No longer is it enough to build security into a solution; now every product that is part of that solution is being examined for its security and risk. In response, the Biden Administration issued a Cybersecurity Executive Order that aims to provide more control over the content of code that comes in contact with government systems and infrastructure.

Continue reading

The Growing Impact of IoT

The use of Internet of Things (IoT) to manage infrastructure and services is not a new concept, but response to the new normal of pandemic life, natural disasters, and the implementation of 5G networks all could accelerate the implementation of IoT solutions.

Remote Management

Stay-at-home orders, social distancing measures, and backlogged inspection schedules all combine to make a great case for implementing sensors and other IoT devices as part of infrastructure management. With technology providing data on the status of equipment, facilities, and general infrastructure like roads and bridges, the need to deploy inspectors to the field can be minimized. In the short term, this reduces potential points of exposure for inspectors and field staff. Longer term, it adds a new "colleague" to field management teams. IoT can handle routine, low risk monitoring, freeing up humans to focus on more complex or higher priority tasks and activities.

Continue reading