In this SC Media perspectives piece, Dr. Darren Death, ICIT Fellow shares his perspective to use RMF as it was intended, as ...
In this SC Media perspectives piece, Dr. David Mussington, CISSP DDN.QTE makes a strong case for a standards-first, layered ...
In this essay, ICIT Fellow Jim Routh discusses how enterprises are gearing up to harness the benefits of Large Language Models (LLMs) and generative AI models. As AI adoption spreads, the use of LLMs ...
Artificial Intelligence (AI) is frequently portrayed as a disruptive force with the potential to revolutionize industries, optimize workflows, and enhance decision-making in ways that were often seen ...
The plain truth is that – many CISOs don't understand materiality. In addition, many organizations have chosen to use a risk lens that downplays the actual risk of an incident, as well as the future ...
The transition to hybrid work models has significantly expanded the security challenges faced by organizations. As employees and third parties access company resources from various remote locations, ...
President Biden’s Executive Order on Improving the Nation’s Cybersecurity calls for ambitious cybersecurity reform across the federal space in response to recent incidents such as the attacks against ...
ICIT CERTIFIED: In this essay, ICIT Contributor Luther Martin from Micro Focus Government Solutions (an ICIT Fellow Program Member) discusses how governments that do not enforce cybercrime laws may in ...
In this Fellow Perspective, Laura Whitt-Winyard discusses the Dark Nexus. The Dark Nexus is the intersection where the worlds of finance and technology meet. Criminals who engage in financial crimes, ...
In “The Rise of Disruptionware: A Cyber-Physical Threat to Operational Technology Environments,” ICIT experts explore an alarming trend which sees adversaries disrupting business continuity and ...