Data

What is Facebook’s Relationship with China and How Has U.S. Data Been Exposed?

by James Scott, Sr. Fellow, Institute for Critical Infrastructure Technology (ICIT), Center for Cyber Influence Operations Studies (CCIOS) In addition to the questions that Facebook must answer concerning its relationship with Cambridge Analytica and the breach of privacy and security on its platform, legislators must also inquire about its relationship with China and how the .. read more

Why We Are No Longer on Facebook

by James Scott, Sr. Fellow ICIT, CCIOS, CSWS The detailed activity and personal data of over 50 million Facebook users were accessed and exploited without the consent of users by Cambridge Analytica in yet another text-book incident facilitated by an under-regulated, irresponsible, dragnet surveillance corporation, Facebook, whose sole-function has become the exploitation and monetization of .. read more

ICIT Publication: I Got 99 Problems But a Breach Ain’t One

Critical Infrastructure Information Security systems are failing under persistent adversarial efforts because too many organizations still depend on antiquated legacy systems, un-cyber-hygienic personnel, and devices that lack security-by-design. This is not merely a cyberwar, we are now in a state of cyber-kinetic-meta war. There was no clear beginning and there will be no end. The .. read more

ICIT Brief: Metadata – The Most Potent Weapon in This Cyberwar: The New Cyber-Kinetic-Meta War

Metadata, or “data about data,” is collected and recorded to describe data, identify trends, administer algorithmic solutions, and model potential scenarios. When one understands how to make sense of seemingly random metadata or how to pair the data with other exfiltrated data pools, there are limitless possibilities for social engineering and cyber exploitation in attacks .. read more

Next Generation Defenses for a Hyper Evolving Threat Landscape: An Anthology of ICIT Fellow Essays Volume I

The onslaught of attacks on our Critical Infrastructure sectors by nation state, mercenary, criminal and cyber jihadist APTs is robbing organizations of millions worth of IP and victimizing citizens whose inadequately protect PII is being exfiltrated and used for economic gain or counterintelligence purposes. Organizations must be on the forefront of bleeding-edge cybersecurity technologies and .. read more

The Necessity of Encryption for Preserving Critical Infrastructure Integrity: Protecting Data At-Rest, In-Transit, and During-Processing with Format Preserving Encryption

The Necessity of Encryption for Preserving Critical Infrastructure Integrity: Protecting Data At-Rest, In-Transit, and During-Processing with Format Preserving Encryption by James Scott, Sr. Fellow, ICIT DOWNLOAD A PDF OF THIS POST HERE Breaches Result in Loss of Trust Cybersecurity is rooted in trust. Organizations expend resources purchasing and maintaining the systems and applications that they .. read more

HHS, ICIT Fellows Collaborate on Privacy and Data in Healthcare

              Thursday, March 26, the Institute for Critical Infrastructure Technology (ICIT) hosted their monthly Fellow Meeting, with featured thought leaders Dr. Kafi Wilson, MHA (ICIT Fellow and CEO, KWMD) and Laura Elizabeth Rosas (Lead Public Health Advisor, Health IT Team, Substance Abuse and Mental Health Services Administration [SAMHSA], U.S. .. read more