article thumbnail

Geopolitical risks could present new opportunities for CIOs: Gartner

CIO

Some of the key focus areas for CIOs, according to Gartner, are digital sovereignty, helping build a local technology industry, running a risk center and provide understanding of cyberspace in different nations.

article thumbnail

2 Innovations That Can Tip the Balance in Cybersecurity

CIO

Eliminating or reducing the advantage that cyber offense has over defense is critical to creating a more stable cyberspace. Worst case, they let security teams limit the damage of a successful attack to something determined to be an acceptable level of risk. Why is this so important?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Major wins and losses in GOVCON – FedSavvy edition April 2024

FedSavvy

Peraton wins big recompete at ARCYBER In January 2024, Peraton was awarded the $889 million contract to provide cyberspace operations support to the U.S. LMI assists the executive leadership, improves global and electronic commerce and enhances internal operations as the USPS develops new products and services.

Loss 130
article thumbnail

Empowering cyber resilience in education: Three strategies for the future

CIO

The question is: How do you use technology safely, and how do you take responsibility for your personal actions in cyberspace? Conclusion The world is full of malicious actors and events. These are the challenges we have to teach and put into practice.

Education 399
article thumbnail

Ransomware And The Defense Industrial Base

Smart Data Collective

Recently, the Cyberspace Solarium Commission issued a report highlighting the government’s preparedness for cyberattacks. According to the report, the government doesn’t have the full capacity to act with the agility and speed required to defend its cyberspace.

article thumbnail

3 Strategies Employed by the Leading Enterprise Cybersecurity Platforms

Smart Data Collective

To get acquainted with the ways security firms are handling the new breed of threats in cyberspace, here’s a rundown of the notable strategies the leading cybersecurity platforms and security firms are offering. Long gone are the days when a lone wolf attacker was manually knocking at the door.”. Breach and attack simulation.

article thumbnail

Shining some light on By Light IT Professional Services

FedSavvy

By Light serves government customers in the Defense, Intelligence and Federal Health sectors and provides solutions in artificial intelligence (AI); cloud and managed services; communications; cyberspace operations; IT services; live, virtual constructive (LVC) training; modeling and simulation (M&S); and software services.