News

The September 2024 dismantling of the Flax Typhoon botnet — a campaign involving 200,000 devices targeting U.S. and global ...
As the Trump administration refines its cybersecurity, resilience, and critical infrastructure security strategies—most ...
The United States is under relentless cyber assault. This is not a distant or hypothetical threat—it’s a silent, ongoing ...
The plain truth is that – many CISOs don't understand materiality. In addition, many organizations have chosen to use a risk lens that downplays the actual risk of an incident, as well as the future ...
ICIT CERTIFIED: In this essay, ICIT Contributor Luther Martin from Micro Focus Government Solutions (an ICIT Fellow Program Member) discusses how governments that do not enforce cybercrime laws may in ...
In this essay, ICIT Fellow Jim Routh discusses how enterprises are gearing up to harness the benefits of Large Language Models (LLMs) and generative AI models. As AI adoption spreads, the use of LLMs ...
Today more than ever, millions of lives depend on the availability, accuracy, and integrity of healthcare networks as they treat patients, develop vaccines, and research medical solutions. The ...
Artificial Intelligence (AI) is frequently portrayed as a disruptive force with the potential to revolutionize industries, optimize workflows, and enhance decision-making in ways that were often seen ...
This initiative was led by a distinguished Task Force, co-chaired by Cory Simpson and Brett Freedman, and included cybersecurity, business, and industry experts. It was motivated by pivotal events ...
In this Fellow Perspective, ICIT Fellow Jim Routh explores the significance of AI and ML models in automating Identity and Access Management (IAM) processes. Jim discusses how these advanced ...