In this SC Media perspectives piece, Dr. Darren Death, ICIT Fellow shares his perspective to use RMF as it was intended, as ...
In this SC Media perspectives piece, Dr. David Mussington, CISSP DDN.QTE makes a strong case for a standards-first, layered ...
The September 2024 dismantling of the Flax Typhoon botnet — a campaign involving 200,000 devices targeting U.S. and global critical infrastructure — demonstrates how the government can protect ...
The plain truth is that – many CISOs don't understand materiality. In addition, many organizations have chosen to use a risk lens that downplays the actual risk of an incident, as well as the future ...
Artificial Intelligence (AI) is frequently portrayed as a disruptive force with the potential to revolutionize industries, optimize workflows, and enhance decision-making in ways that were often seen ...
ICIT CERTIFIED: In this paper, the researchers at IOActive, an ICIT Fellow Circle Member, offer three real-world scenarios involving serious vulnerabilities that affect the aviation, maritime, and ...
Join ICIT for this exclusive virtual roundtable convening top leaders in cybersecurity, energy infrastructure, and public policy to discuss strategies for fortifying the nation’s energy sector against ...
Improving the Nation's Cybersecurity: An ICIT Fellows' Analysis of President Biden's Executive Order
President Biden’s Executive Order on Improving the Nation’s Cybersecurity calls for ambitious cybersecurity reform across the federal space in response to recent incidents such as the attacks against ...
In this essay, ICIT Fellow Jim Routh discusses how enterprises are gearing up to harness the benefits of Large Language Models (LLMs) and generative AI models. As AI adoption spreads, the use of LLMs ...
ICIT CERTIFIED: In this essay, ICIT Contributor Luther Martin from Micro Focus Government Solutions (an ICIT Fellow Program Member) discusses how governments that do not enforce cybercrime laws may in ...
The United States faces a mounting challenge in safeguarding its cybersecurity in an ever-evolving digital landscape. In this ICIT research paper, our experts address the increasing need for offensive ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results