The Perfect Weapon, Hidden in Plain Sight: A Study on How the Espressif Wi-Fi and BLE Chips and Modules can be Weaponized for Espionage, Disruption, and Destruction
As a leader of critical infrastructure cybersecurity research, ICIT [...]
As a leader of critical infrastructure cybersecurity research, ICIT [...]
This project researches how to maintain election integrity amid [...]
Panelists Include: Benjamin [...]
Panelists Include: Dr. Ron Ross, Fellow, [...]
Previously, cyberattacks resulting in the targeted disruption of electricity [...]
ICIT Solution Insights offers use case based education on [...]
Today more than ever, millions of lives depend on [...]
Panelists Include: - Dave Summit, CISO, [...]
In continued support of our mission to cultivate a [...]
ICIT Solution Insights offers use case based education [...]
ICIT Certified: This content has been reviewed and [...]
Since the January 2, 2020 drone strikes that killed [...]
ICIT Certified Content: This publication from ICIT Fellow Program [...]
ICIT Diversity in Cybersecurity National security and critical infrastructure [...]
ICIT Certified Content: This Blackberry publication contains expert insights [...]
In "The Rise of Disruptionware: A Cyber-Physical Threat to [...]
Cybersecurity researchers often walk a fine line between objectively [...]
This spring, The Institute for Critical Infrastructure Technology (ICIT) [...]
ICIT CERTIFIED: In this paper, the researchers at IOActive, [...]
ICIT CERTIFIED: In this paper, the OT Research Team [...]
This publication and Executive Summary below were published by [...]
Audits have unfortunately become an opportunity to criticize an [...]
When developing strategies to defend our Nation’s Energy and [...]
This publication and the abstract below was published by [...]
This publication and the abstract below was published by [...]
This publication and the abstract below was published by [...]
This publication and the abstract below was published by Computing [...]
This publication and the abstract below was published by [...]
This publication and the abstract below was published by [...]
This publication and the abstract below was published by [...]
Today, the National Counterintelligence and Security Center (NCSC) published [...]
This publication and the Introduction below were published by [...]