Uncategorized

ICIT Analysis: Hacking Elections is Easy! Part Three

Coming Soon! Join ICIT at HPE Protect 2016 Gaylord National Resort and Convention Center National Harbor, MD September 13-16, 2016 View Agenda and Register Today!

On September 2nd, 2016, posted in: Uncategorized by

Institute Note

Before making our research public, we soft release our reports to a few select media outlets to gain objective feedback from industry colleagues.  During the soft release of “The ICIT Ransomware Report”, a pre-edited version of the report was made available in error.  The pre-edited version contained language which could have led the reader to .. read more

On March 8th, 2016, posted in: Uncategorized by

ICIT Report: Know Your Enemies 2.0 – The Encyclopedia of the Most Prominent Hacktivists, Nation State and Mercenary Hackers

The Institute for Critical Infrastructure Technology has exponentially increased our profiling of Nations State, Mercenary, Hail Mary, Hacktivist and Cyber Criminal Gangs. We offer profiling advisory to Legislative Representatives and Committees, Federal Agencies, U.S. Military as well as European Union and Nato Alliance members. Contact us for more information.  

On February 8th, 2016, posted in: Uncategorized by Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

ICIT Fellows convene to discuss NextGen cybersecurity with NASA Ames, Army Cyber Institute, Blackberry

At the closed door October 2015 Institute for Critical Infrastructure Technology Fellows Meeting, Fellows and government leaders convened to discuss the top threats facing critical infrastructure sectors and the technologies and strategies which can mitigate risk.  The top challenges identified include an expanding attack surface driven by IoT and increases in mobile devices, better organized .. read more

ICIT Brief: Know Your Enemies – A Primer on Advanced Persistent Threat Groups

The Institute for Critical Infrastructure Technology has exponentially increased our profiling of Nations State, Mercenary, Hail Mary, Hacktivist and Cyber Criminal Gangs. We offer profiling advisory to Legislative Representatives and Committees, Federal Agencies, U.S. Military as well as European Union and Nato Alliance members. Contact us for more information.  

On November 2nd, 2015, posted in: Uncategorized by Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Securing Federal Data Post OPM: Lunch & Learn Summary + Slides

                This week the Institute for Critical Infrastructure Technology held a Lunch and Learn called “Securing Data for Today’s Federal Agency” which focused on the increasingly daunting task of protecting federal data in an age of information sharing and increased threats both inside and outside an agency.  An .. read more