shopify stats

ICIT Certified Content: Government Agencies Deserve A Better Way To Pentest

ICIT Certified Content: This content has been reviewed by ICIT [...]

By |2022-06-28T17:07:17+00:00June 28th, 2022|Cybersecurity Research, Frameworks & Guidance, Front Page Publication, ICIT Publications, Thought Leadership|Comments Off on ICIT Certified Content: Government Agencies Deserve A Better Way To Pentest

May 2022 Fellows’ Insights Roundtable: “How Should Legislators and Agency Leaders Deter Cyber Attacks Incited by Geopolitical Conflict?”

Each quarter, a selection of ICIT Fellows gather to [...]

By |2022-05-25T17:06:56+00:00May 25th, 2022|Cybersecurity Research, Featured, Front Page Publication, ICIT Publications, Thought Leadership, Uncategorized|Comments Off on May 2022 Fellows’ Insights Roundtable: “How Should Legislators and Agency Leaders Deter Cyber Attacks Incited by Geopolitical Conflict?”

The State of Cybersecurity in K-12 & Higher Education

By Mack Peterman, Regan McGovern, Jordan Christian, Lexi Rutkowski, [...]

By |2022-06-22T15:53:20+00:00May 16th, 2022|Academic Initiative, Cybersecurity Research, Front Page Publication, ICIT Publications|Comments Off on The State of Cybersecurity in K-12 & Higher Education

ICIT Research – Playing to Win: Using Strategy to Create Your Cybersecurity Battleplan

Securing U.S. critical infrastructures and democratic institutions requires whole-of-government [...]

By |2022-05-17T21:21:42+00:00March 22nd, 2022|Cybersecurity Research, Featured, Front Page Publication, ICIT Publications, Latest Posts, Thought Leadership|Comments Off on ICIT Research – Playing to Win: Using Strategy to Create Your Cybersecurity Battleplan

Returning to the Wilderness of Mirrors: How Great Power Competition and Cyberwarfare Could Precipitate a Digital-Age Cold War

At the height of the Cold War, former CIA Chief [...]

By |2022-03-03T21:52:08+00:00March 3rd, 2022|Cybersecurity Research, Featured, Front Page Publication, ICIT Publications, Latest Posts, Thought Leadership|Comments Off on Returning to the Wilderness of Mirrors: How Great Power Competition and Cyberwarfare Could Precipitate a Digital-Age Cold War

Shielded by the Melting Pot: How Diversity and Inclusion Improve U.S. National Security and Resilience

America is defined from its “Melting Pot” shared culture [...]

By |2022-03-15T20:43:44+00:00February 26th, 2022|Cybersecurity Research, Featured, Front Page Publication, ICIT Publications, Latest Posts, Thought Leadership|Comments Off on Shielded by the Melting Pot: How Diversity and Inclusion Improve U.S. National Security and Resilience

ICIT’s Bright Minds Q&A Series – Developing Proactive, Responsive, and Ethical Artificial Intelligence Policies

By Joyce Hunter, ICIT Executive Director In [...]

By |2022-02-24T01:39:23+00:00February 24th, 2022|Front Page Publication, ICIT Publications, Latest Posts, Technology Assessments, Thought Leadership, Uncategorized|Comments Off on ICIT’s Bright Minds Q&A Series – Developing Proactive, Responsive, and Ethical Artificial Intelligence Policies

The ICIT Cyber Legislation and Agency Initiatives 2021 Retrospective and 2022 Prospective Roundtable

Each quarter, a selection of ICIT Fellows gather to [...]

By |2022-05-25T17:07:03+00:00February 4th, 2022|Cybersecurity Research, Front Page Publication, ICIT Publications, Thought Leadership, Uncategorized|Comments Off on The ICIT Cyber Legislation and Agency Initiatives 2021 Retrospective and 2022 Prospective Roundtable

ICIT Fellow Perspective Essay: An Overview for the Potential for Blockchain Technology to Improve Cybersecurity

In continued support of our mission to cultivate a [...]

By |2022-02-01T00:42:11+00:00January 28th, 2022|Cybersecurity Research, Front Page Publication, ICIT Publications, Uncategorized|Comments Off on ICIT Fellow Perspective Essay: An Overview for the Potential for Blockchain Technology to Improve Cybersecurity

Ransomware Weaponized: Nation States, Cryptocurrencies, and Great Power Competition

Nation state-sponsored threat actors develop, disseminate, and deploy ransomware [...]

By |2022-02-19T16:39:55+00:00December 29th, 2021|Cybersecurity Research, Front Page Publication, ICIT Publications|Comments Off on Ransomware Weaponized: Nation States, Cryptocurrencies, and Great Power Competition

ICIT Certified Content: 2021 CISO DDoS Handbook

ICIT Certified Content: This Mazebolt whitepaper contains expert insights [...]

By |2021-12-27T17:35:46+00:00December 27th, 2021|Cybersecurity Research, Front Page Publication, ICIT Publications, Latest Posts, Partnership, Thought Leadership|Comments Off on ICIT Certified Content: 2021 CISO DDoS Handbook

ICIT Certified Content: 2021 Devo SOC Performance Report™: SOC Leaders and Staff Not Aligned

ICIT Certified Content: The 2021 Devo SOC Performance Report™ [...]

By |2021-12-16T20:20:00+00:00December 16th, 2021|Cybersecurity Research, ICIT Publications, Partnership, Thought Leadership|Comments Off on ICIT Certified Content: 2021 Devo SOC Performance Report™: SOC Leaders and Staff Not Aligned

ICIT’s Bright Minds Q & A Series: Adversarial Simulation Is Proactive in a Reactive World

By Itzik Kotler, ICIT Fellow and Co-Founder & CTO, SafeBreachIn [...]

By |2021-12-06T23:14:59+00:00December 6th, 2021|Featured, Front Page Publication, ICIT Publications, Latest Posts, Thought Leadership|Comments Off on ICIT’s Bright Minds Q & A Series: Adversarial Simulation Is Proactive in a Reactive World

ICIT’s Bright Minds Q&A Series: The Application of Zero Trust to Legacy Systems and Operational Technologies

By Don Maclean, ICIT Fellow and Chief Cyber Security [...]

By |2021-12-07T14:20:38+00:00November 17th, 2021|Featured, Front Page Publication, ICIT Publications, Latest Posts, Thought Leadership|Comments Off on ICIT’s Bright Minds Q&A Series: The Application of Zero Trust to Legacy Systems and Operational Technologies

ICIT Certified Content: 2021 Threat Hunting Report

ICIT Certified Content: This Blackberry publication contains expert insights [...]

By |2021-10-27T16:19:18+00:00October 27th, 2021|Cybersecurity Research, Front Page Publication, ICIT Publications, Latest Posts, Partnership, Thought Leadership|Comments Off on ICIT Certified Content: 2021 Threat Hunting Report

Safeguarding the COVID-19 Vaccine: A Case Study in Global Supply Chain Security

In the race to create a Covid-19 vaccine by [...]

By |2021-09-29T19:16:53+00:00September 29th, 2021|Cybersecurity Research, Front Page Publication, ICIT Publications, Thought Leadership|Comments Off on Safeguarding the COVID-19 Vaccine: A Case Study in Global Supply Chain Security

ICIT Virtual Briefing: Secure Automation for Mission Readiness

Federal agencies have increased focus on Intelligent Automation (IA) [...]

By |2021-10-18T17:13:19+00:00September 23rd, 2021|Cybersecurity Research, Front Page Publication, ICIT Publications, Latest Posts, Thought Leadership, Uncategorized|Comments Off on ICIT Virtual Briefing: Secure Automation for Mission Readiness

ICIT Virtual Briefing: Getting Started on the Path to Zero Trust

Zero trust isn’t a new concept, although it’s certainly [...]

By |2021-10-18T17:13:43+00:00September 8th, 2021|Cybersecurity Research, Front Page Publication, ICIT Publications|Comments Off on ICIT Virtual Briefing: Getting Started on the Path to Zero Trust

The Modern Security Battlefield: What 2020 taught us about gaps in vulnerability management

PRIMER to ICIT VIRTUAL BRIEFING With prolific security breaches [...]

By |2021-09-23T14:12:33+00:00September 7th, 2021|Cybersecurity Research, Front Page Publication, ICIT Publications|Comments Off on The Modern Security Battlefield: What 2020 taught us about gaps in vulnerability management

Improving the Nation’s Cybersecurity: An ICIT Fellows’ Analysis of President Biden’s Executive Order

President Biden’s Executive Order on Improving the Nation’s Cybersecurity [...]

By |2021-06-07T21:48:06+00:00June 7th, 2021|Frameworks & Guidance, Front Page Publication, ICIT Publications, Latest Posts, Thought Leadership|Comments Off on Improving the Nation’s Cybersecurity: An ICIT Fellows’ Analysis of President Biden’s Executive Order

ICIT On-Demand: The Newest Attack Vectors – Infrastructure as Code & API Security

Moving applications and development to the cloud has delivered [...]

By |2021-07-09T12:48:51+00:00May 26th, 2021|Featured, ICIT Publications, Thought Leadership|Comments Off on ICIT On-Demand: The Newest Attack Vectors – Infrastructure as Code & API Security

Operating in a Compromised Environment – Trusted Recovery from the SolarWinds Breach

In continued support of our mission to cultivate a [...]

By |2021-04-02T22:31:06+00:00January 26th, 2021|ICIT Publications, Thought Leadership|Comments Off on Operating in a Compromised Environment – Trusted Recovery from the SolarWinds Breach

The Perfect Weapon, Hidden in Plain Sight: A Study on How the Espressif Wi-Fi and BLE Chips and Modules can be Weaponized for Espionage, Disruption, and Destruction

As a leader of critical infrastructure cybersecurity research, ICIT [...]

By |2020-11-30T15:16:56+00:00November 12th, 2020|Cybersecurity Research, Featured, Front Page Publication, ICIT Publications, Physical Security, Technology Assessments, Thought Leadership|Comments Off on The Perfect Weapon, Hidden in Plain Sight: A Study on How the Espressif Wi-Fi and BLE Chips and Modules can be Weaponized for Espionage, Disruption, and Destruction

ICIT On-Demand – DevSecOps Public Sector Accelerated ATO Initiative

2nd in the Series of DevSecOps Accelerated ATO As [...]

By |2021-02-22T19:30:24+00:00October 30th, 2020|Frameworks & Guidance, ICIT Publications, Sector Specific, Thought Leadership|Comments Off on ICIT On-Demand – DevSecOps Public Sector Accelerated ATO Initiative

Weapons of Mass Disruption: An Assessment of the Threat Disruptionware Poses to Energy Sector Continuity

Previously, cyberattacks resulting in the targeted disruption of electricity [...]

The Healthcare Research Security Pandemic: Threats to Patient Care, National Security, and the Economy

Today more than ever, millions of lives depend on [...]

The Business Value of a Diverse InfoSec Team: A Discussion on How Gender, Racial, Cognitive, and LGBTQ Diversity Improves Cybersecurity Outcomes

ICIT Diversity in Cybersecurity National security and critical infrastructure [...]

Modernization Requires Leadership: Leading the way to Cloud Security, Zero Trust, and Threat Intelligence

In Modernization Requires Leadership: Leading the way to Cloud [...]

By |2019-10-14T16:29:38+00:00October 11th, 2019|ICIT Publications, Thought Leadership|0 Comments

The Rise of Disruptionware: A Cyber-Physical Threat to Operational Technology Environments

In "The Rise of Disruptionware: A Cyber-Physical Threat to [...]

By |2019-09-23T10:58:48+00:00September 22nd, 2019|Cybersecurity Research, ICIT Publications, Physical Security|0 Comments

D.C. Takes On Energy Sector Threats: A Summary of Recent Agency and Congressional Efforts

Cybersecurity researchers often walk a fine line between objectively [...]

By |2019-09-05T12:05:26+00:00September 5th, 2019|Cybersecurity Research, ICIT Publications, Sector Specific|0 Comments

Did China Just Legalize Espionage?: Recent Provisions to Chinese Law Increases Risk to Multinational Organizations Operating in China

Under new provisions to China’s 2017 National Cybersecurity Law [...]

By |2019-03-04T15:10:49+00:00March 3rd, 2019|ICIT Publications, Thought Leadership|0 Comments

Cyber Personnel Are Essential Staff: Federal Recruitment & Retention in Post Shutdown America

One of the most underreported yet greatest national security [...]

By |2019-02-25T15:37:01+00:00February 25th, 2019|ICIT Publications, Sector Specific, Thought Leadership|0 Comments

The USB Threat No One is Talking About: Research on Firmware-Based Attacks Reveals the Urgent Need to Improve Supply Chain Security for all USB-Enabled Devices

This is the second in a series of publications [...]

By |2018-10-22T17:32:05+00:00October 22nd, 2018|ICIT Publications, Technology Assessments|0 Comments

Where the East Meets the West: How Western Internet and Modern Communications Technology Helped Soviet-style Propaganda in Donbass

This document is published as part of ICIT's Contributor [...]

By |2018-12-04T15:54:45+00:00October 17th, 2018|ICIT Publications, Thought Leadership|0 Comments
Go to Top