ICIT ResearchApr 27ICIT ResearchTesting and Governance Considerations for the Management of Open-Source Software
ICIT ResearchDec 19, 2022Digital TransformationChanging the Perception: Using Digital Transformation to Increase Trust in Government Agencies
ICIT ResearchSep 22, 2022ICIT ResearchLeveraging the 2022 President Management Agenda to Increase Efficiency, Improve Trust & Resilience
ICIT ResearchAug 17, 2022ICIT ResearchResearch Assessment of Factors Contributing to Cybersecurity Employee Turnover and Retention
ICIT ResearchJun 28, 2022ICIT ResearchICIT Certified Content: Government Agencies Deserve A Better Way To Pentest
ICIT ResearchMay 4, 2022Emerging TrendsICIT Certified Content: SBOMs Reducing Open Source Risk Throughout the Development of Software
ICIT ResearchMay 4, 2022Emerging TrendsICIT Certified Content: Making Better Cyber Risk Decisions - Architecting the Choices
ICIT ResearchMar 22, 2022ICIT ResearchICIT Research - Playing to Win: Using Strategy to Create Your Cybersecurity Battleplan
ICIT ResearchMar 3, 2022ICIT ResearchReturning to the Wilderness of Mirrors: Power and Cyberwarfare Could Start a Digital-Age Cold War
ICIT ResearchFeb 26, 2022ICIT ResearchShielded by the Melting Pot: How Diversity & Inclusion Improve U.S. National Security and Resilience
ICIT ResearchDec 29, 2021ICIT ResearchRansomware Weaponized: Nation States, Cryptocurrencies, and Great Power Competition
ICIT ResearchDec 16, 2021ICIT ResearchICIT Certified Content: 2021 Devo SOC Performance Report™: SOC Leaders and Staff Not Aligned
ICIT ResearchSep 29, 2021ICIT ResearchSafeguarding the COVID-19 Vaccine: A Case Study in Global Supply Chain Security
ICIT ResearchSep 7, 2021Emerging TrendsThe Modern Security Battlefield: What 2020 taught us about gaps in vulnerability management