shopify stats

Weapons of Mass Disruption: An Assessment of the Threat Disruptionware Poses to Energy Sector Continuity

Previously, cyberattacks resulting in the targeted disruption of electricity [...]

The Healthcare Research Security Pandemic: Threats to Patient Care, National Security, and the Economy

Today more than ever, millions of lives depend on [...]

The Business Value of a Diverse InfoSec Team: A Discussion on How Gender, Racial, Cognitive, and LGBTQ Diversity Improves Cybersecurity Outcomes

ICIT Diversity in Cybersecurity National security and critical infrastructure [...]

Modernization Requires Leadership: Leading the way to Cloud Security, Zero Trust, and Threat Intelligence

In Modernization Requires Leadership: Leading the way to Cloud [...]

By |2019-10-14T16:29:38+00:00October 11th, 2019|ICIT Publications, Thought Leadership|0 Comments

The Rise of Disruptionware: A Cyber-Physical Threat to Operational Technology Environments

In "The Rise of Disruptionware: A Cyber-Physical Threat to [...]

By |2019-09-23T10:58:48+00:00September 22nd, 2019|Cybersecurity Research, ICIT Publications, Physical Security|0 Comments

D.C. Takes On Energy Sector Threats: A Summary of Recent Agency and Congressional Efforts

Cybersecurity researchers often walk a fine line between objectively [...]

By |2019-09-05T12:05:26+00:00September 5th, 2019|Cybersecurity Research, ICIT Publications, Sector Specific|0 Comments

Did China Just Legalize Espionage?: Recent Provisions to Chinese Law Increases Risk to Multinational Organizations Operating in China

Under new provisions to China’s 2017 National Cybersecurity Law [...]

By |2019-03-04T15:10:49+00:00March 3rd, 2019|ICIT Publications, Thought Leadership|0 Comments

Cyber Personnel Are Essential Staff: Federal Recruitment & Retention in Post Shutdown America

One of the most underreported yet greatest national security [...]

By |2019-02-25T15:37:01+00:00February 25th, 2019|ICIT Publications, Sector Specific, Thought Leadership|0 Comments

The USB Threat No One is Talking About: Research on Firmware-Based Attacks Reveals the Urgent Need to Improve Supply Chain Security for all USB-Enabled Devices

This is the second in a series of publications [...]

By |2018-10-22T17:32:05+00:00October 22nd, 2018|ICIT Publications, Technology Assessments|0 Comments

Where the East Meets the West: How Western Internet and Modern Communications Technology Helped Soviet-style Propaganda in Donbass

This document is published as part of ICIT's Contributor [...]

By |2018-12-04T15:54:45+00:00October 17th, 2018|ICIT Publications, Thought Leadership|0 Comments
Go to Top