The FDA Finally Suggests Meaningful Action to Secure Medical Devices
by James Scott, Sr. Fellow, Institute for Critical Infrastructure Technology [...]
by James Scott, Sr. Fellow, Institute for Critical Infrastructure Technology [...]
by Drew Spaniel, Researcher, Institute for Critical Infrastructure Technology The [...]
by James Scott, Sr. Fellow, Institute for Critical Infrastructure Technology [...]
by James Scott, Senior Fellow, Institute for Critical Infrastructure Technology [...]
by James Scott, Sr. Fellow, Institute for Critical Infrastructure Technology [...]
by James Scott, Co-Founder and Sr. Fellow, ICIT The International [...]
Dragnet surveillance capitalists turned dragnet surveillance propagandists remain under-controlled to [...]
by James Scott, Sr. Fellow, Institute for Critical Infrastructure Technology [...]
People jest that space is the final frontier, unchartered territory, [...]
by James Scott, Sr. Fellow ICIT, CCIOS, CSWS The detailed [...]
Nearly three-quarters of the $80 billion annually spent on [...]
The CLOUD Act is meaningful bipartisan legislation that will empower [...]
IT modernization is confounded by shoestring budgets, system incompatibilities, and [...]
On February 20, 2018, twenty-one national security officials, including General [...]
Purchase Here Abstract Cogito ergo sum (I think, [...]
Download This Paper The human condition is plagued [...]
Carbanak, currently one of the most effective advanced persistent threats [...]
“This is an advisory that studies the weaponized digital applications [...]
The reckless handling of data collected in capitalistic dragnet surveillance [...]
A catastrophic breach of Equifax’s systems was inevitable because of [...]
by James Scott, Sr. Fellow, ICIT Show-of-force intelligence gathering and [...]
Election integrity is a non-partisan issue that merits significant bipartisan [...]
HHS is aggressively working with industry to introduce organizational cybersecurity [...]
Critical Infrastructure Information Security systems are failing under persistent adversarial [...]
Metadata, or “data about data,” is collected and recorded to [...]
Recent efforts by governments to weaken encryption, introduce exploitable vulnerabilities [...]
Download Now The onslaught of attacks on our [...]
The Necessity of Encryption for Preserving Critical Infrastructure Integrity: Protecting [...]
By James Scott, Sr. Fellow, ICIT Last week, ICIT urged [...]
Virtually every computer, smartphone, and internet-enabled mobile device has a [...]
By James Scott, Sr. Fellow, ICIT Baseless Attribution Discussions Distract [...]
By James Scott, Senior Fellow, Institute for Critical Infrastructure Technology [...]
Download Here Industry experts and federal agencies such [...]
Download Here K-12 students are the most prevalent [...]
Download Now With S.J.Res.34, every citizen will have [...]
We Connect the Dots between Nation State, Cyber Mercenary, Cyber [...]
Download The health sector is the most vulnerable, [...]
Download Here Non-Profit and Non-Government Organizations (NGOs) rely [...]
Download Now Signature and behavioral based anti-malware are [...]
Download Now Just as American and European critical [...]
From Left to Right: James Scott, Sr. Fellow, ICIT; [...]
Download Here With recent accusations of fake news [...]
by James Scott, Sr. Fellow, ICIT Introduction Malicious actors can [...]
Download Here Identity and Access Management (IAM) solutions [...]
Download Now! As the adversarial threat landscape continues [...]
by James Scott (Sr. Fellow, ICIT) & Parham Eftekhari (Sr. [...]
by James Scott, Sr. Fellow, ICIT and Drew Spaniel, Fellow, [...]
by James Scott, Sr. Fellow, ICIT and Drew Spaniel, Researcher, [...]
Authored By: James Scott, Sr. Fellow, ICIT & Drew Spaniel, [...]
Download The United States election process has been [...]
Download Here Despite being the most at-risk and [...]
Download Here! True democracy relies on the reliability [...]
Download Among our Nation’s critical infrastructures, the Energy [...]
Download The criminal culture of theft that has [...]
Download The acceleration of State Sponsored and Mercenary [...]
Download Due to the plague of APTs, malware, [...]
Download Acts of domestic terrorism in the West [...]
Click to Download Until now it has been [...]
Click to Download This Report NIST Special Publication [...]
Ransomware, the weaponization of encryption, has struck fear and confusion [...]
Cerber and KeRanger are two of the latest Ransomware debacles [...]
Institute note: during our non-public soft distribution, we discovered that an incorrect, [...]
Click to Download This Institute for Critical Infrastructure [...]
Among all of America’s critical infrastructures, the healthcare sector is [...]
Congressional Briefing in support of ICIT's Brief held at [...]
Throughout June 2015, the United States Office of Personnel Management [...]
In June 2015, the Nation learned that the personnel records [...]