top of page

ICIT Digital Library
Trusted Critical Infrastructure Technology Research and Resources from ICIT Community Experts. Arm yourself with insights on current trends, innovation and emerging technology for our nation's critical infrastructure.
Presented in partnership with


Iran and the Cxpanding Cyber Front: What Government Leaders Need to Know
Explore how Iran’s expanding cyber operations are reshaping national security risk for governments and critical infrastructure. This perspective outlines evolving tactics—from disruptive attacks to long-term espionage—and what leaders must do now to prepare for escalating cyber conflict.
5 hours ago5 min read


Entangled Migrations PQC, QKD, and US–PRC Risk Postures for Critical Infrastructure
Examine how U.S. and PRC approaches to post-quantum cryptography (PQC) and quantum key distribution (QKD) reveal divergent risk strategies for protecting critical infrastructure. This ICIT perspective explores why relying solely on PQC may leave Tier-1 systems exposed—and whether a defense-in-depth model is needed for the quantum era.
3 days ago3 min read


The Three-Legged Drone Stool: Policy, Production, and Protection
Discover why U.S. drone dominance depends on three interconnected pillars—policy, production, and protection. In this SC Media perspective, Brett Freedman explains how strengthening regulatory frameworks, scaling industrial capacity, and advancing counter-drone defenses are essential to maintaining national security and protecting critical infrastructure in the age of drone warfare.
Mar 96 min read


The Drone Gap: Why the U.S. Industrial Base Continues to Fall Behind in a World at War by Drone
As drone warfare reshapes global conflict, the U.S. industrial base is falling behind—exposing tactical gaps, supply risks, and strategic vulnerabilities that demand urgent investment and policy response.
Mar 45 min read


Living Between Breakdown and Build: America’s Infrastructure is Being Built in Plain Sight
In this latest SC Media perspective, ICIT CEO Cory Simpson highlights the tension that defines this moment: while global competition, cyber threats, and climate disruptions create a sense of breakdown, the quiet work of building better, more resilient infrastructure is reshaping the foundations of everyday life.
Feb 234 min read


Quantum-Resilient Convergence: The Shared Defense of AI, Space, and Critical Infrastructure
As AI systems and LEO satellite networks scale, quantum risk grows. Dr. David Mussington, ICIT Fellow outlines why post-quantum cryptography must be embedded now — not retrofitted later — to secure the infrastructure of the 2030s.
Feb 182 min read


Infrastructure is Affordability: Investing in Systems that Shape Daily Life
ICIT CEO Cory Simpson lays out why infrastructure investment drives affordability—strengthening energy, water, transport, and digital systems to reduce long-term costs and improve resilience.
Feb 175 min read


Strengthening the Civilian Backbone of National Security: ICIT’s Center for FCEB Resilience 2025 Impact Report
ICIT’s Center for FCEB Resilience marked a pivotal year advancing civilian cyber resilience through research, convenings, and public-private collaboration. See how government, industry, and partners are strengthening the federal enterprise—and how your organization can help lead the next phase.
Jan 283 min read


Closing the Cyber Workforce Gap: Why Hands-On Experience Matters
Discover why hands-on experience is essential to closing the cybersecurity workforce gap in this SC Media perspective. Learn how practical training, apprenticeships, and real-world learning pathways help develop the next generation of cyber professionals and strengthen national resilience.
Jan 264 min read


The Quantum-Cryptography Cliff: From Roadmaps to Reality
Explore the challenges and opportunities of quantum cryptography in this SC Media perspective. Learn why transitioning from theoretical roadmaps to real-world deployment is critical for securing communications, defending sensitive data, and preparing infrastructure for the quantum era.
Jan 205 min read


From Orbit to Operations: Why Space is Central to the Administration and Critical Infrastructure
Explore why space capabilities are essential to U.S. national strategy and critical infrastructure in this SC Media perspective. Learn how satellite systems, space policy, and commercial innovation underpin communications, defense, navigation, and resilience in an era of growing geopolitical competition.
Jan 155 min read


Keeping Water Flowing: Cyber Risk, SRMAs, and the Water Sector
Learn why cyber risk is a critical concern for the U.S. water sector and how the Sector Risk Management Agency (EPA) and public-private partners are working to protect utilities from cyber threats. This SC Media perspective highlights evolving risks, resource gaps, and collaborative solutions that help keep water safe and flowing.
Jan 155 min read


The Electric Tech Stack: Its Importance and How the U.S. can Keep Pace with China
Explore how the U.S. can maintain competitive advantage in advanced technology against China by strengthening the “electric tech stack” that underpins defense, infrastructure, and innovation. This insight from SC Media highlights why semiconductor supply chains, critical materials, industrial policy, and cross-sector collaboration are essential to national security and economic resilience.
Jan 125 min read


The Mission Continues: Advancing Cyber Resilience for West Virginia and the Nation
Discover how West Virginia is advancing cyber resilience nationwide. From WVU Cyber’s community-focused programs to strategic partnerships that protect critical systems, this post highlights innovation, workforce development, and infrastructure security for the digital future.
Dec 16, 20255 min read


Securing America’s Ports: Hidden Maritime Security Threats from Foreign-Owned and Operated Technology
Uncovers the hidden cybersecurity risks posed by foreign-owned and operated technologies in U.S. ports—and why modernizing maritime security is now a national imperative.
Dec 8, 20255 min read


From Governance to Power: How America’s new NSS Reframes Cyber and Critical Infrastructure
The new National Security Strategy reframes cyber and critical infrastructure as instruments of national power—not just governance. This op-ed examines how the NSS elevates infrastructure resilience, public-private coordination, and technology leadership as core pillars of U.S. security in an era of escalating digital conflict.
Dec 8, 20255 min read


Critical Infrastructure Awareness Month: ICIT’s 2026 Vision to Strengthen and Modernize U.S. Critical Infrastructure
ICIT organizes its focus area on critical infrastructure into three interdependent pillars that incorporate four of the sixteen critical infrastructure sectors: Energy & Grid, Water & Wastewater, and Transportation & Telecommunications. In 2026, we will be examining these pillars through the lens of topics like Defense Critical Infrastructure, Cyber Force, Drones, Federal Civilian Executive Branch, and Data Centers & Artificial Intelligence.
Nov 29, 20255 min read


No borders, Only Exposure: AI Agentic Threats and the Data Center Imperative
In this SC Media perspectives piece, Dr. David Mussington, demonstrates that with deeply converged infrastructure—extending across hyperscale data centers, global cloud services, and AI-powered supply chains—risk must also be considered as converged.
Nov 21, 20254 min read


CISO Dilemma: Should the Enterprise Offer Personal Data Protection to the Employee as a Benefit?
As cyber-threats evolve, so must our mindset. In his recent article at SC Media, Jim Routh (an esteemed Institute for Critical Infrastructure Technology Fellow) poses a powerful question: Should enterprises offer personal data protection to employees as a benefit?
Nov 4, 202511 min read


Executing the RMF as an Engineering Discipline, not a Paperwork Exercise
In this SC Media perspectives piece, Dr. Darren Death, ICIT Fellow shares his perspective to use RMF as it was intended, as an engineering framework that links security requirements to system behavior and verifies those relationships continuously. The framework already defines a complete model for continuous authorization. It must be executed as part of engineering and operations rather than as a separate compliance process.
Oct 27, 202510 min read
bottom of page
-500x198.png)