The U.S. Committee on National Security Systems describes an “insider threat” as an individual that uses authorized access, wittingly or unwittingly, to do harm to the security […]

The U.S. Committee on National Security Systems describes an “insider threat” as an individual that uses authorized access, wittingly or unwittingly, to do harm to the security […]
Streamlining software development is vital to our nation’s infrastructure in both the public and the private sector. On January 31, 2019, the Department of Homeland Security’s Science […]
A group of congressman and senators are known for their ability to work on both sides of the political aisle, reintroduced legislation on January 17 aimed at […]
When you submit your name, address, or phone number to a company or website, do you ever consider where your information may end up? Millions of Uber […]
Between the years 2013 and 2014, 3 billion of Yahoo’s accounts in Israel and the United States were compromised. Just this week Yahoo announced an $85 million […]
Friday, October 12th, 2018 AP News reported that the Pentagon revealed a cyber breach releasing over 30,000 travel records that included personal information belonging to US Military and Civil Employees. […]
Last Sunday, nearly 100 hackers were shoulder-to-shoulder with members of the US Marines with one mission in mind, improve the security of the Marine Corps Enterprise Network. In […]
A security researcher at Black Hat today detailed numerous vulnerabilities he found by penetrating and studying a brand of voting machine. Carsten Schürmann, an associate professor with […]
Experiments at the DEF CON hacker conference meant to test the security of voting machines and elections are unrealistic, an organization representing secretaries of state said today. […]
The fuel mix in Texas has shifted faster than in any other state, and whether the electric grid can handle a tough summer could have a big […]
© 2018 International Critical Infrastructure Security Institute (ICISI)
All Rights Reserved Worldwide