artificial intelligence

Hacking Cyborgs: By 2025, Non-Augmented Humans Will Be Obsolete. But There’s Bad News…

The human condition is plagued by a labyrinth of shortcomings, frailties, and limitations that hinder man from reaching his fullest potential. Therefore, it only makes sense that we find ourselves at the next phase in human evolution where restricted man merges with the infinite possibilities of hyper-evolving technologies. This techno-human transmutation will prove to be .. read more

Equifax: The Hazards of Dragnet Surveillance Capitalism Part 2: Just Another Data Breach? Or C-Suite Criminal Negligence?

The reckless handling of data collected in capitalistic dragnet surveillance has developed into a national security and privacy epidemic.  The Equifax breach should epitomize the consequences of negligent data brokerage and serve as a wake-up call to similar organizations who profit from dragnet surveillance and the employment of psychographic and demographic Big Data algorithms. In .. read more

ICIT Analysis – Equifax: America’s In-Credible Insecurity – Part One

A catastrophic breach of Equifax’s systems was inevitable because of systemic organizational disregard for cybersecurity and cyber-hygiene best practices, as well as Equifax’s reliance on unqualified executives for information security. While Equifax has proven itself to be a compromised, irresponsible data custodian, Experian, TransUnion, and other data brokers may be just as vulnerable, irresponsible, and .. read more

ICIT Brief: Metadata – The Most Potent Weapon in This Cyberwar: The New Cyber-Kinetic-Meta War

Metadata, or “data about data,” is collected and recorded to describe data, identify trends, administer algorithmic solutions, and model potential scenarios. When one understands how to make sense of seemingly random metadata or how to pair the data with other exfiltrated data pools, there are limitless possibilities for social engineering and cyber exploitation in attacks .. read more

ICIT Analysis: The Cyber Shield Act

Industry experts and federal agencies such as NSA, NASA and NIST have repeatedly pushed for the implementation and standardization of the bare essentials of Information Security, such as security-by-design, cyber-hygiene training, and layered defenses, to be recognized as crucial topics on the Hill.  The Cyber Shield Act is an excellent idea for improving informed consumer .. read more

ICIT Analysis: How to Crush the Health Sector’s Ransomware Pandemic

The health sector is the most vulnerable, most targeted, and resoundingly least equipped to defend against hackers who are pummeling healthcare organizations with ransomware attacks.   This ransomware epidemic will only become more severe and costly as the infection volume in 2017 will trump infections in 2016. In this post, entitled “How to Crush the .. read more

ICIT Analysis: Signature Based Malware Detection is Dead

Signature and behavioral based anti-malware are no match for next generation adversaries who utilize mutating hashes, sophisticated obfuscation mechanisms, self-propagating malware, and intelligent malware components. In this analysis, entitled “Signature Based Malware Detection is Dead,” the Institute for Critical Infrastructure Technology provides a thought-provoking analysis of the necessity for critical infrastructure sectors to adopt advanced .. read more

ICIT Brief: In 2017, The Insider Threat Epidemic Begins

Just as American and European critical infrastructure executives were beginning to wrap their minds around the devastation of the Office of Personnel Management breach, ransomware erupted onto the scene, followed by concentrated DDoS attacks such as the Mirai botnet attack on Dyn, which enabled a quantum leap for cyber criminals.  Now, all techno-forensic indicators suggest .. read more