News

They weren’t weak or broken. They were warriors—friends I trusted with my life. Friends who carried weight with strength and ...
Cyberattacks can now compromise critical infrastructure faster than humans can perceive or respond. As adversaries grow more ...
The September 2024 dismantling of the Flax Typhoon botnet — a campaign involving 200,000 devices targeting U.S. and global critical infrastructure — demonstrates how the government can protect ...
The plain truth is that – many CISOs don't understand materiality. In addition, many organizations have chosen to use a risk lens that downplays the actual risk of an incident, as well as the future ...
Discover the evolving landscape of AI governance in enterprises, focusing on Large Language Models (LLMs) and generative artificial intelligence (GenAI). Learn how the Chief Information Security ...
The Cyberspace Solarium Commission (CSC) was established in the John S. McCain National Defense Authorization Act for Fiscal Year 2019 to "develop a consensus on a strategic approach to defending the ...
Join ICIT for this exclusive virtual roundtable convening top leaders in cybersecurity, energy infrastructure, and public policy to discuss strategies for fortifying the nation’s energy sector against ...
ICIT CERTIFIED: In this paper, the researchers at IOActive, an ICIT Fellow Circle Member, offer three real-world scenarios involving serious vulnerabilities that affect the aviation, maritime, and ...
The Active Cyber Defense Certainty Act (ACDC Act), was introduced by US Representative Tom Graves in 2017. This Act proposed to “provide a defense to prosecution for fraud and related activity in ...
The Institute for Critical Infrastructure Technology is a non-partisan 501 (c)3 not-for-profit organization. EIN #47-5294309 ...
In “The Rise of Disruptionware: A Cyber-Physical Threat to Operational Technology Environments,” ICIT experts explore an alarming trend which sees adversaries disrupting business continuity and ...