The U.S. Committee on National Security Systems describes an “insider threat” as an individual that uses authorized access, wittingly or unwittingly, to do harm to the security […]

The U.S. Committee on National Security Systems describes an “insider threat” as an individual that uses authorized access, wittingly or unwittingly, to do harm to the security […]
Streamlining software development is vital to our nation’s infrastructure in both the public and the private sector. On January 31, 2019, the Department of Homeland Security’s Science […]
Friday, October 12th, 2018 AP News reported that the Pentagon revealed a cyber breach releasing over 30,000 travel records that included personal information belonging to US Military and Civil Employees. […]
Last Sunday, nearly 100 hackers were shoulder-to-shoulder with members of the US Marines with one mission in mind, improve the security of the Marine Corps Enterprise Network. In […]
The use of bug bounties by federal agencies and other entities around the globe is “rapidly approaching critical mass,” a new study states. A total of 116 […]
A former top defense and intelligence official contended Thursday that the most alarmist estimates of cyber weapons emphasize the wrong dangers. Joseph Nye, a former assistant defense […]
The federal government has released a guidebook that brings federal agencies’ chief information security offices up to speed on their responsibilities. The CISO Handbook, produced by the […]
In a report released today, OMB and Executive Office of the President agree with something we have known for a long time. That the Federal Government struggles to recruit and […]
© 2018 International Critical Infrastructure Security Institute (ICISI)
All Rights Reserved Worldwide