The ICIT Strategic Partner Webcast “Why Trust and Data Integrity Are the Cornerstones of AI for the Public Sector” is now ...
This ICIT virtual briefing, Securing the Backbone of Deployment: Protecting Critical Infrastructure for Military Mobility, will assess how vulnerabilities in transportation critical ...
The plain truth is that – many CISOs don't understand materiality. In addition, many organizations have chosen to use a risk lens that downplays the actual risk of an incident, as well as the future ...
Improving the Nation's Cybersecurity: An ICIT Fellows' Analysis of President Biden's Executive Order
President Biden’s Executive Order on Improving the Nation’s Cybersecurity calls for ambitious cybersecurity reform across the federal space in response to recent incidents such as the attacks against ...
Trusted Cybersecurity and Technology Research from ICIT Community Experts. Arm yourself with insights on current trends, innovation and emerging technology for virutally every public and private ...
In this essay, ICIT Fellow Jim Routh discusses how enterprises are gearing up to harness the benefits of Large Language Models (LLMs) and generative AI models. As AI adoption spreads, the use of LLMs ...
Most of the 8 million people estimated to fly every day directly or indirectly interact with the technologies running the “typical airport’ experience” – avionics software on planes, air traffic ...
Aaron Faulkner is a co-founder and strategic leader at Tychon.io, a cybersecurity software company focused on automated cryptographic discovery, inventory, and quantum readiness. He is also the ...
Economist Noah Smith recently popularized a useful term to frame the core industrial capabilities that will decide both manufacturing leadership and battlefield advantage in the near future: the ...
Colonel Candice E. Frost explores the threats by China, Russia, Iran, North Korea, and cybercrime in an in depth dive on their activities on networks. China, as the greatest persistent threat to ...
The transition to hybrid work models has significantly increased security challenges for organizations, as employees and third parties access company resources from various remote locations. This ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results