Non-Technical Articles

Make Plans to Attend the 2024 Alabama Digital Government Summit

Register to attend now! The 2024 Alabama Digital Government Summit is set to take place on November 13, 2024, at ...

State of Alabama Election Moratorium

State of Alabama Election Moratorium ...

Honoring OIT Employees for their Years of State Service

Since 2006, the State of Alabama has recognized the performance, devotion, and years of service of State employees with the ...

OIT Implements Self-Service Password Reset

In June of this year, the Office of Information Technology (OIT) will implement Microsoft’s Self-Service Password Reset (SSPR) to allow ...

OIT Hosts Microsoft G5 Enablement Monthly Meetings

The State of Alabama has made tremendous progress in achieving Microsoft G5 Licensing alignment within the Alabama Shared Microsoft Tenant ...

Technical Articles

Blockchain Technology: Local Government Applications and Challenges

This paper illustrates the benefits and challenges of blockchain technology by exploring case studies of its application and implementation in ...

Intel Insights: How to Secure PowerShell

If PowerShell is not needed, prevent its execution on systems after performing appropriate testing to assess the impact to the ...

Security Primer – Ryuk

Ryuk is one of the most prevalent ransomware variants in the state, local, tribal, and territorial (SLTT) government threat landscape, ...

Attackers Inside the Walls: Detecting Malicious Activity

Small and medium-sized businesses (SMBs) do not always have the budget for an advanced intrusion detection system (IDS) technology. Open-source ...

Security Primer – IcedID

IcedID, also known as BokBot, is a modular banking trojan that targets user financial information and is capable of acting ...