OIT Doubles State Combined Campaign Goal
Every year in the fall, the Office of Information Technology (OIT) participates in the State Combined Campaign (SCC). Started in… Continue Reading OIT Doubles State Combined Campaign Goal
Every year in the fall, the Office of Information Technology (OIT) participates in the State Combined Campaign (SCC). Started in… Continue Reading OIT Doubles State Combined Campaign Goal
Started in 1947, the United States Marine Corps’ Toys for Tots program has been bringing smiles to the faces of… Continue Reading OIT Supports Montgomery Area Toys For Tots Drive
As everyone knows, the holiday season is the most wonderful time of the year. Our homes and local communities are… Continue Reading Ringing in the Holiday Season at OIT
The State of Alabama Office of Information Technology (OIT) recently partnered with Government Technology, a division of media and research… Continue Reading 2022 Alabama Digital Government Summit
On October 18, 2022, the State of Alabama Office of Information Technology (OIT) and the Alabama Emergency Management Agency (EMA)… Continue Reading Statewide Cyber Exercise
This paper illustrates the benefits and challenges of blockchain technology by exploring case studies of its application and implementation in… Continue Reading Blockchain Technology: Local Government Applications and Challenges
If PowerShell is not needed, prevent its execution on systems after performing appropriate testing to assess the impact to the… Continue Reading Intel Insights: How to Secure PowerShell
Ryuk is one of the most prevalent ransomware variants in the state, local, tribal, and territorial (SLTT) government threat landscape,… Continue Reading Security Primer – Ryuk
Small and medium-sized businesses (SMBs) do not always have the budget for an advanced intrusion detection system (IDS) technology. Open-source… Continue Reading Attackers Inside the Walls: Detecting Malicious Activity
IcedID, also known as BokBot, is a modular banking trojan that targets user financial information and is capable of acting… Continue Reading Security Primer – IcedID