TECHNICAL ARTICLES Blockchain Technology: Local Government Applications and Challenges This paper illustrates the benefits and challenges of blockchain technology by exploring case studies of its application and implementation in Intel Insights: How to Secure PowerShell If PowerShell is not needed, prevent its execution on systems after performing appropriate testing to assess the impact to the Security Primer – Ryuk Ryuk is one of the most prevalent ransomware variants in the state, local, tribal, and territorial (SLTT) government threat landscape, Attackers Inside the Walls: Detecting Malicious Activity Small and medium-sized businesses (SMBs) do not always have the budget for an advanced intrusion detection system (IDS) technology. Open-source Security Primer – IcedID IcedID, also known as BokBot, is a modular banking trojan that targets user financial information and is capable of acting Security Primer – Ransomware Throughout 2019, state, local, tribal, and territorial (SLTT) government entities are increasingly encountering ransomware attacks resulting in significant network downtime, Security Primer – TrickBot TrickBot is a modular banking trojan that targets sensitive information and acts as a dropper for other malware. Since June BowTie – A deep learning feedforward neural network for sentiment analysis How to model and encode the semantics of human-written text and select the type of neural network to process it Internet of Things (IoT) Trust Concerns (Draft Document) This draft white paper identifies seventeen technical trust-related issues that may negatively impact the adoption of IoT products and services.