News
They weren’t weak or broken. They were warriors—friends I trusted with my life. Friends who carried weight with strength and ...
Cyberattacks can now compromise critical infrastructure faster than humans can perceive or respond. As adversaries grow more ...
Cyberattacks are targeting the infrastructure we rely on every day—hospitals, power grids, supply chains. The Cybersecurity ...
The September 2024 dismantling of the Flax Typhoon botnet — a campaign involving 200,000 devices targeting U.S. and global critical infrastructure — demonstrates how the government can protect ...
Please join us for an opportunity to hear from Cong. Gabe Amo, SVP of Cybersecurity at Jacobs, John Karabias, and national security leaders about cybersecurity policy challenges in protecting the ...
On April 2, 2025, ICIT CEO Cory Simpson submitted testimony to the U.S. House Committee on Oversight and Government Reform for a hearing titled “Salt Typhoon: Securing America’s Telecommunications ...
Organizations that deploy AI cannot rely solely on the security frameworks and best practices traditionally applied to conventional IT systems. For example, a firewall will not prevent an AI model ...
Navigating Uncertainty in Government Cloud Security As federal agencies enter 2025, they face an increasingly volatile cybersecurity landscape, with state-sponsored threat actors—particularly from ...
These escalating threats have ignited a long-overdue push to bolster cybersecurity at the state and local levels, where the impact of an attack is often most immediate and severe. During a recent ...
Join ICIT for this exclusive virtual roundtable convening top leaders in cybersecurity, energy infrastructure, and public policy to discuss strategies for fortifying the nation’s energy sector against ...
This initiative was led by a distinguished Task Force, co-chaired by Cory Simpson and Brett Freedman, and included cybersecurity, business, and industry experts. It was motivated by pivotal events ...
To address these challenges, there is a pressing need for the evolution of third-party governance practices and cybersecurity controls. Traditional methods, such as annual vendor risk assessments, are ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results