News

Cyberattacks can now compromise critical infrastructure faster than humans can perceive or respond. As adversaries grow more ...
The Institute for Critical Infrastructure Technology (ICIT) invites you to a timely, virtual conversation between Assaf Harel, a leading voice in Israeli cybersecurity law and former IDF legal advisor ...
Cyberattacks are targeting the infrastructure we rely on every day—hospitals, power grids, supply chains. The Cybersecurity ...
The September 2024 dismantling of the Flax Typhoon botnet — a campaign involving 200,000 devices targeting U.S. and global critical infrastructure — demonstrates how the government can protect ...
The United States is under relentless cyber assault. This is not a distant or hypothetical threat—it’s a silent, ongoing campaign targeting our economy and critical infrastructure. Our adversaries, ...
The Institute for Critical Infrastructure Technology (ICIT) is a nonprofit, nonpartisan, 501 (c)3think tank with the mission of modernizing, securing, and making resilient critical infrastructure that ...
Organizations that deploy AI cannot rely solely on the security frameworks and best practices traditionally applied to conventional IT systems. For example, a firewall will not prevent an AI model ...
Navigating Uncertainty in Government Cloud Security As federal agencies enter 2025, they face an increasingly volatile cybersecurity landscape, with state-sponsored threat actors—particularly from ...
Join ICIT for this exclusive virtual roundtable convening top leaders in cybersecurity, energy infrastructure, and public policy to discuss strategies for fortifying the nation’s energy sector against ...
This initiative was led by a distinguished Task Force, co-chaired by Cory Simpson and Brett Freedman, and included cybersecurity, business, and industry experts. It was motivated by pivotal events ...
The transition to hybrid work models has significantly expanded the security challenges faced by organizations. As employees and third parties access company resources from various remote locations, ...
To address these challenges, there is a pressing need for the evolution of third-party governance practices and cybersecurity controls. Traditional methods, such as annual vendor risk assessments, are ...