News

Cyberattacks are targeting the infrastructure we rely on every day—hospitals, power grids, supply chains. The Cybersecurity ...
The September 2024 dismantling of the Flax Typhoon botnet — a campaign involving 200,000 devices targeting U.S. and global ...
As the Trump administration refines its cybersecurity, resilience, and critical infrastructure security strategies—most ...
The Institute for Critical Infrastructure Technology (ICIT) invites you to a timely, virtual conversation between Assaf Harel, a leading voice in Israeli cybersecurity law and former IDF legal advisor ...
The plain truth is that – many CISOs don't understand materiality. In addition, many organizations have chosen to use a risk lens that downplays the actual risk of an incident, as well as the future ...
In “The Rise of Disruptionware: A Cyber-Physical Threat to Operational Technology Environments,” ICIT experts explore an alarming trend which sees adversaries disrupting business continuity and ...
In this essay, ICIT Fellow Jim Routh discusses how enterprises are gearing up to harness the benefits of Large Language Models (LLMs) and generative AI models. As AI adoption spreads, the use of LLMs ...
Today more than ever, millions of lives depend on the availability, accuracy, and integrity of healthcare networks as they treat patients, develop vaccines, and research medical solutions. The ...
This initiative was led by a distinguished Task Force, co-chaired by Cory Simpson and Brett Freedman, and included cybersecurity, business, and industry experts. It was motivated by pivotal events ...
ICIT CERTIFIED: In this essay, ICIT Contributor Luther Martin from Micro Focus Government Solutions (an ICIT Fellow Program Member) discusses how governments that do not enforce cybercrime laws may in ...
ICIT CERTIFIED: In this paper, the researchers at IOActive, an ICIT Fellow Circle Member, offer three real-world scenarios involving serious vulnerabilities that affect the aviation, maritime, and ...