News

The first test of a leader is presence. People may not remember the exact words you use, but they remember how your presence ...
We are delighted to congratulate Dr. David Mussington, CISSP, ICIT Fellow and FCEB Co‑Chair, on being re‑elected to the ISC2 ...
The “quantum-age” refers to a near-future moment when quantum computers begin to reshape fields, from drug discovery and ...
American strength was shaped by geography. Oceans gave us insulation. Distance gave us time. And that shaped how we prepared for risk: we built defenses, not resilience. Cyberspace shattered that ...
The Institute for Critical Infrastructure Technology (ICIT) invites you to a virtual roundtable discussion featuring Mark Teubl, Policy Lead for Cyber and Intelligence for the Select Committee on the ...
ICIT CERTIFIED: In this paper, the researchers at IOActive, an ICIT Fellow Circle Member, offer three real-world scenarios involving serious vulnerabilities that affect the aviation, maritime, and ...
The connection between financial and cybersecurity crime is known as the "Dark Nexus." This Dark Nexus is the intersection where the worlds of finance and technology meet. Criminals who engage in ...
The plain truth is that – many CISOs don't understand materiality. In addition, many organizations have chosen to use a risk lens that downplays the actual risk of an incident, as well as the future ...
The September 2024 dismantling of the Flax Typhoon botnet — a campaign involving 200,000 devices targeting U.S. and global critical infrastructure — demonstrates how the government can protect ...
This research paper examines the risks and implications of offensive cybersecurity operations in the United States, highlighting the need for government involvement, ethical conduct, and international ...