top of page

ICIT Digital Library
Trusted Critical Infrastructure Technology Research and Resources from ICIT Community Experts. Arm yourself with insights on current trends, innovation and emerging technology for our nation's critical infrastructure.
Presented in partnership with


Operating at the Speed of the Adversary
This is the second in a series of articles examining the security implications of AI-driven vulnerability discovery. The first addressed the engineering foundation. This one addresses the operational reality.
This one addresses how organizations must operate from where they actually are, which for most is not a clean, well-architected starting point but rather decades of accumulated technical decisions that were never evaluated through a security engineering lens.
Apr 279 min read


AI Vulnerability Discovery and the Case for Systems Security Engineering
For decades, the approach to building technology has operated on an implicit assumption that security could be addressed after the fact...This created an environment in which building technology that simply worked was sufficient, and the cost of building technology that was engineered to be secure was treated as an unnecessary burden on development timelines and budgets... The capabilities demonstrated by recent advances in artificial intelligence have fundamentally altered t
Apr 169 min read


Acquisition Reform Is Materializing, but the Harder Test Still Lies Ahead
Acquisition reform returns as a familiar Washington ritual, yet change is often only seen at the margins. The task at hand has simply been too monumental to effectively revamp the entire system: Reforming how the Pentagon buys alone isn’t enough, any meaningful transformation depends on revitalizing the industrial base, strengthening supply chain security, giving industry the capital and demand certainty to invest, requirements-setting, and sustained workforce development and
Apr 78 min read


The Drone Gap: Why the U.S. Industrial Base Continues to Fall Behind in a World at War by Drone
As drone warfare reshapes global conflict, the U.S. industrial base is falling behind—exposing tactical gaps, supply risks, and strategic vulnerabilities that demand urgent investment and policy response.
Mar 45 min read


From Orbit to Operations: Why Space is Central to the Administration and Critical Infrastructure
Explore why space capabilities are essential to U.S. national strategy and critical infrastructure in this SC Media perspective. Learn how satellite systems, space policy, and commercial innovation underpin communications, defense, navigation, and resilience in an era of growing geopolitical competition.
Jan 155 min read


The Electric Tech Stack: Its Importance and How the U.S. can Keep Pace with China
Explore how the U.S. can maintain competitive advantage in advanced technology against China by strengthening the “electric tech stack” that underpins defense, infrastructure, and innovation. This insight from SC Media highlights why semiconductor supply chains, critical materials, industrial policy, and cross-sector collaboration are essential to national security and economic resilience.
Jan 125 min read


The Mission Continues: Advancing Cyber Resilience for West Virginia and the Nation
Discover how West Virginia is advancing cyber resilience nationwide. From WVU Cyber’s community-focused programs to strategic partnerships that protect critical systems, this post highlights innovation, workforce development, and infrastructure security for the digital future.
Dec 16, 20255 min read


Securing America’s Ports: Hidden Maritime Security Threats from Foreign-Owned and Operated Technology
Uncovers the hidden cybersecurity risks posed by foreign-owned and operated technologies in U.S. ports—and why modernizing maritime security is now a national imperative.
Dec 8, 20255 min read


Executing the RMF as an Engineering Discipline, not a Paperwork Exercise
In this SC Media perspectives piece, Dr. Darren Death, ICIT Fellow shares his perspective to use RMF as it was intended, as an engineering framework that links security requirements to system behavior and verifies those relationships continuously. The framework already defines a complete model for continuous authorization. It must be executed as part of engineering and operations rather than as a separate compliance process.
Oct 27, 202510 min read


Modernizing American Critical Infrastructure: Why the Need is Urgent, and Where to Begin
In a recent conversation hosted by the Institute for Critical Infrastructure Technology (ICIT), Cory Simpson, CEO of ICIT, welcomed Barry Mainz, CEO of Forescout Technologies, to discuss the pressing need to modernize and secure the nation’s critical infrastructure.
Sep 10, 20252 min read


DARPA’s quantum-age playbook: Engineering cyber resilience with formal methods
The “quantum-age” refers to a near-future moment when quantum computers begin to reshape fields, from drug discovery and logistics to national defense and cryptography.
Unlike classical computers, which solve problems step by step—like trying every key on a lock one at a time—quantum systems can evaluate many possibilities simultaneously.
Aug 4, 20254 min read
bottom of page
-500x198.png)