ICIT organizes its focus area on critical infrastructure into three interdependent pillars that incorporate four of the ...
There must be an institutionalized division of labor covering notification, intelligence integration, defense, forensics, and attribution. The new requirement encompasses: Purpose-built systems for ...
The plain truth is that – many CISOs don't understand materiality. In addition, many organizations have chosen to use a risk lens that downplays the actual risk of an incident, as well as the future ...
As a leader of critical infrastructure cybersecurity research, ICIT has warned about supply chain security concerns in the past and we have supported initiatives and frameworks like Deliver ...
Artificial Intelligence (AI) is frequently portrayed as a disruptive force with the potential to revolutionize industries, optimize workflows, and enhance decision-making in ways that were often seen ...
The United States faces a mounting challenge in safeguarding its cybersecurity in an ever-evolving digital landscape. In this ICIT research paper, our experts address the increasing need for offensive ...
In this essay, ICIT Fellow Jim Routh discusses how enterprises are gearing up to harness the benefits of Large Language Models (LLMs) and generative AI models. As AI adoption spreads, the use of LLMs ...
This initiative was led by a distinguished Task Force, co-chaired by Cory Simpson and Brett Freedman, and included cybersecurity, business, and industry experts. It was motivated by pivotal events ...
Improving the Nation's Cybersecurity: An ICIT Fellows' Analysis of President Biden's Executive Order
President Biden’s Executive Order on Improving the Nation’s Cybersecurity calls for ambitious cybersecurity reform across the federal space in response to recent incidents such as the attacks against ...
In this Fellow Perspective, Laura Whitt-Winyard discusses the Dark Nexus. The Dark Nexus is the intersection where the worlds of finance and technology meet. Criminals who engage in financial crimes, ...
ICIT CERTIFIED: In this essay, ICIT Contributor Luther Martin from Micro Focus Government Solutions (an ICIT Fellow Program Member) discusses how governments that do not enforce cybercrime laws may in ...
NATO faces a surge of hostile drones and electronic warfare that current defenses were not designed to defeat at scale, as seen in Ukraine and along the Alliance’s exposed flanks. The answer is an ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results