News
The United States is under relentless cyber assault. This is not a distant or hypothetical threat—it’s a silent, ongoing ...
You are invited to join ICIT for an exclusive virtual briefing on securing America’s Infrastructure Securing America’s Infrastructure Against Foreign Threats with special guest Cong. Gabe Amo, and ...
The plain truth is that – many CISOs don't understand materiality. In addition, many organizations have chosen to use a risk lens that downplays the actual risk of an incident, as well as the future ...
In this essay, ICIT Fellow Jim Routh discusses how enterprises are gearing up to harness the benefits of Large Language Models (LLMs) and generative AI models. As AI adoption spreads, the use of LLMs ...
In “The Rise of Disruptionware: A Cyber-Physical Threat to Operational Technology Environments,” ICIT experts explore an alarming trend which sees adversaries disrupting business continuity and ...
This initiative was led by a distinguished Task Force, co-chaired by Cory Simpson and Brett Freedman, and included cybersecurity, business, and industry experts. It was motivated by pivotal events ...
Improving the Nation's Cybersecurity: An ICIT Fellows' Analysis of President Biden's Executive Order
President Biden’s Executive Order on Improving the Nation’s Cybersecurity calls for ambitious cybersecurity reform across the federal space in response to recent incidents such as the attacks against ...
OT security is finally getting its due attention and priority. As asset owners and OT security architects face growing risks and pressure to connect and converge their networks with those of IT, they ...
Artificial Intelligence (AI) is frequently portrayed as a disruptive force with the potential to revolutionize industries, optimize workflows, and enhance decision-making in ways that were often seen ...
As a leader of critical infrastructure cybersecurity research, ICIT has warned about supply chain security concerns in the past and we have supported initiatives and frameworks like Deliver ...
ICIT CERTIFIED: In this essay, ICIT Contributor Luther Martin from Micro Focus Government Solutions (an ICIT Fellow Program Member) discusses how governments that do not enforce cybercrime laws may in ...
As federal agencies enter 2025, they face an increasingly volatile cybersecurity landscape, with state-sponsored threat actors—particularly from China—mounting persistent and sophisticated attacks ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results