article thumbnail

Geopolitical risks could present new opportunities for CIOs: Gartner

CIO

Some of the key focus areas for CIOs, according to Gartner, are digital sovereignty, helping build a local technology industry, running a risk center and provide understanding of cyberspace in different nations. Data sovereignty will be a key focus area for CIOs.

article thumbnail

2 Innovations That Can Tip the Balance in Cybersecurity

CIO

Cyber threats are increasingly automated using advanced technology. Eliminating or reducing the advantage that cyber offense has over defense is critical to creating a more stable cyberspace. But improved use of automation — combined with software-based advanced analytics — can help level the playing field. Why is this so important?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Major wins and losses in GOVCON – FedSavvy edition April 2024

FedSavvy

Amentum wins Army takeaway contract In October 2023, Amentum was awarded a five-year, $327 million contract to engineer, integrate and test advanced prototype command, control, communications, computers, cyber, intelligence, surveillance and reconnaissance (C5ISR) technologies and systems for the U.S. This is a takeaway from Leidos.

Loss 130
article thumbnail

CIOs sharpen tech strategies to support hybrid work

CIO

In its Future of Work predictions for 2023 , IDC called hybrid work “a mainstay for our global future work landscape,” adding that “hybrid work will drive new technology solutions across functions and industries alike.” So now whenever we do something in IT, like release a capability, we have these principles in mind.

article thumbnail

Empowering cyber resilience in education: Three strategies for the future

CIO

The question is: How do you use technology safely, and how do you take responsibility for your personal actions in cyberspace? Secure software design goes from development to the product stage to deployment and continuous monitoring. It’s a process that never ends. Conclusion The world is full of malicious actors and events.

Education 393
article thumbnail

Ransomware And The Defense Industrial Base

Smart Data Collective

According to the Symantec Internet Security Threat Report of 2016, governments’ growing dependence on information technology makes them vulnerable to ransomware attacks. Hackers perpetrate ransomware attacks against the defense industrial base to undercut the military, technological, and economic advantages of a government.

article thumbnail

Shining some light on By Light IT Professional Services

FedSavvy

By Light serves government customers in the Defense, Intelligence and Federal Health sectors and provides solutions in artificial intelligence (AI); cloud and managed services; communications; cyberspace operations; IT services; live, virtual constructive (LVC) training; modeling and simulation (M&S); and software services.