Skip to content
OIT header logo

Office of Information Technology

  • About
    • Mission
    • Leadership
    • Organizational Chart
    • History of OIT
    • Strategic Plan
    • Primary Mandates
  • Services
    • Overview of Services
    • Training Resources
    • Service Catalog
  • Cybersecurity
    • Cyber Incident Reporting
    • Online Safety Resources
    • State and Local Cybersecurity Grant Program
  • Library
    • Documents
    • OIT Privacy & Related Statements
    • State IT Policy
  • News
  • Contact

Category: Technical Articles

  • Home
  • Technical Articles

Blockchain Technology: Local Government Applications and Challenges

January 16, 2020 OIT

This paper illustrates the benefits and challenges of blockchain technology by exploring case studies of its application and implementation in […]

Technical Articles

Intel Insights: How to Secure PowerShell

January 16, 2020 OIT

If PowerShell is not needed, prevent its execution on systems after performing appropriate testing to assess the impact to the […]

Technical Articles

Security Primer – Ryuk

January 16, 2020 OIT

Ryuk is one of the most prevalent ransomware variants in the state, local, tribal, and territorial (SLTT) government threat landscape, […]

Technical Articles

Attackers Inside the Walls: Detecting Malicious Activity

October 4, 2019 OIT

Small and medium-sized businesses (SMBs) do not always have the budget for an advanced intrusion detection system (IDS) technology. Open-source […]

Technical Articles

Security Primer – IcedID

October 4, 2019 OIT

IcedID, also known as BokBot, is a modular banking trojan that targets user financial information and is capable of acting […]

Technical Articles

Security Primer – Ransomware

October 4, 2019 OIT

Throughout 2019, state, local, tribal, and territorial (SLTT) government entities are increasingly encountering ransomware attacks resulting in significant network downtime, […]

Technical Articles

Security Primer – TrickBot

October 4, 2019 OIT

TrickBot is a modular banking trojan that targets sensitive information and acts as a dropper for other malware. Since June […]

Technical Articles

BowTie – A deep learning feedforward neural network for sentiment analysis

October 3, 2019 OIT

How to model and encode the semantics of human-written text and select the type of neural network to process it […]

Technical Articles

Internet of Things (IoT) Trust Concerns (Draft Document)

October 2, 2019 OIT

This draft white paper identifies seventeen technical trust-related issues that may negatively impact the adoption of IoT products and services. […]

Technical Articles

Categories

  • Cybersecurity Resources
  • Events
  • Fraud/Scams
  • Helpful Tips
  • Internet Safety
  • Malware
  • News
  • OIT-News
  • Phishing
  • Technical Articles
  • Uncategorized

 

STATE OF ALABAMA
OFFICE OF INFORMATION TECHNOLOGY
64 NORTH UNION STREET,
MONTGOMERY, AL 36130
Main Office: (334) 242-3800
Service Desk: (334) 242-2222
service.desk@oit.alabama.gov
LinkedIn icon

  • Public Records
  • Mission
  • Services
Copyright © 2026 Office of Information Technology All rights reserved. Theme: Flash Pro by ThemeGrill. Powered by WordPress