Remove Advantage Remove Cyberspace Remove Management Remove Security
article thumbnail

Peraton’s evolution and investments give them a competitive advantage…are you ready?

FedSavvy

In July 2022 , Peraton announced that it had appointed John Coleman, former President of the Global Defense and Security business unit, as President of Peraton’s Citizen Security and Public Services Sector. Citizen Security – Led by John Coleman. Within the last year, Peraton went through yet another reorganization.

Advantage 130
article thumbnail

How Hospital Security Breaches Devastate Local Communities

Smart Data Collective

This is all to say that hospital cyber-security breaches can have a devastating impact on the people impacted. The same HIPAA regulations that have been protecting patient privacy since the 90s are now applied to digital healthcare technology to ensure that patients enjoy the same level of privacy even in cyberspace. More closed.

Hospitals 176
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CIOs sharpen tech strategies to support hybrid work

CIO

This include technologies that enable them to replicate in cyberspace the personal connections and spontaneous collegiality that more easily happen in person, as they seeking experiences that are consistent regardless of where they’re working on any given day.

article thumbnail

3 Strategies Employed by the Leading Enterprise Cybersecurity Platforms

Smart Data Collective

To address newer challenges, security providers have developed new technologies and strategies to combat evolving threats. To get acquainted with the ways security firms are handling the new breed of threats in cyberspace, here’s a rundown of the notable strategies the leading cybersecurity platforms and security firms are offering.

article thumbnail

Major wins and losses in GOVCON – FedSavvy edition April 2024

FedSavvy

Air Force’s Command and Control Incident Management Emergency Response Application (C2IMERA) at Kessel Run. Leidos is continuing to develop C2IMERA and working to expand the system to include all Air Force installations, associated forward operating locations and contingency locations for C2 and emergency management requirements.

Loss 130
article thumbnail

T4NG2 – Who’s Who in the New Zoo?

FedSavvy

This includes work on the five-year, $1 billion VA IT Operations and Services ( ITOPS ) T4NG task order, which covers cybersecurity, enterprise management framework, system and data migration, cloud computing, program management, strategy, enterprise architecture and planning support. LogC2 is predominantly serving the U.S.

article thumbnail

Proactive cybersecurity: sometimes offence is the best defense

CIO

It’s important to understand that launching an offensive cybersecurity strategy does not mean abandoning traditional defensive measures such as deploying firewalls, intrusion detection systems (IDS), anti-malware software, patch management, security information and event management (SIEM), and other such tools.