Opinion
The Drone Gap: Why the U.S. Industrial Base Continues to Fall Behind in a World at War by Drone
As drone warfare reshapes global conflict, the U.S. industrial base is falling behind—exposing tactical gaps, supply risks, and strategic vulnerabilities that demand urgent investment and policy ...
The Institute for Critical Infrastructure Technology (ICIT) is proud to announce and welcome Benjamin J. Fernandes, PhD, MBA, as a new ICIT Fellow.
In this latest SC Media perspective, ICIT CEO Cory Simpson highlights the tension that defines this moment: while global ...
The plain truth is that – many CISOs don't understand materiality. In addition, many organizations have chosen to use a risk lens that downplays the actual risk of an incident, as well as the future ...
In this essay, ICIT Fellow Jim Routh discusses how enterprises are gearing up to harness the benefits of Large Language Models (LLMs) and generative AI models. As AI adoption spreads, the use of LLMs ...
The infrastructure of the 2030s is being built now. Artificial intelligence systems are scaling across government and critical infrastructure. Low Earth Orbit (LEO) satellite networks are expanding ...
As a leader of critical infrastructure cybersecurity research, ICIT has warned about supply chain security concerns in the past and we have supported initiatives and frameworks like Deliver ...
Economist Noah Smith recently popularized a useful term to frame the core industrial capabilities that will decide both manufacturing leadership and battlefield advantage in the near future: the ...
ICIT CERTIFIED: In this paper, the researchers at IOActive, an ICIT Fellow Circle Member, offer three real-world scenarios involving serious vulnerabilities that affect the aviation, maritime, and ...
Most of the 8 million people estimated to fly every day directly or indirectly interact with the technologies running the “typical airport’ experience” – avionics software on planes, air traffic ...
There must be an institutionalized division of labor covering notification, intelligence integration, defense, forensics, and attribution. The new requirement encompasses: Purpose-built systems for ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results