This is the second in a series of articles examining the security implications of AI-driven vulnerability discovery. The first addressed the engineering foundation. This one addresses the operational ...
When conflict escalates in the Middle East, the battlefield is never limited to geography. It extends into energy grids, government networks, transportation systems, and financial infrastructure. The ...
In an earlier article last summer, "America's blind spot as drone production surges globally," I argued that U.S. counter-drone policy was falling well behind the pace of technological and ...
In this essay, ICIT Fellow Jim Routh discusses how enterprises are gearing up to harness the benefits of Large Language Models (LLMs) and generative AI models. As AI adoption spreads, the use of LLMs ...
The plain truth is that – many CISOs don't understand materiality. In addition, many organizations have chosen to use a risk lens that downplays the actual risk of an incident, as well as the future ...
The September 2024 dismantling of the Flax Typhoon botnet — a campaign involving 200,000 devices targeting U.S. and global critical infrastructure — demonstrates how the government can protect ...
In “The Rise of Disruptionware: A Cyber-Physical Threat to Operational Technology Environments,” ICIT experts explore an alarming trend which sees adversaries disrupting business continuity and ...
President Biden’s Executive Order on Improving the Nation’s Cybersecurity calls for ambitious cybersecurity reform across the federal space in response to recent incidents such as the attacks against ...
The ICIT Quantum-Resilient Convergence paper established that Post-Quantum Cryptography (PQC) migration and AI/Low Earth Orbit (LEO) infrastructure modernization are a single coupled program, and that ...
The Institute for Critical Infrastructure Technology is a non-partisan 501(c)3 not-for-profit organization.
The United States faces a mounting challenge in safeguarding its cybersecurity in an ever-evolving digital landscape. In this ICIT research paper, our experts address the increasing need for offensive ...