This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Cobwebs Technologies describes open-source intelligence gathering as an effort to create a rounded out picture by methodically piecing together small bits of information. Cobwebs said that OSINT is particularly effective in organizational counterintelligence. ArchIntel™ -. These attacks are, however, far from being inevitable.
which provides information technology (IT) services to include cybersecurity, network engineering, cloud migration, as well as a variety of professional services. Navy (NAVSEA, NAVWAR, NAVSUP), and the Defense Counterintelligence and Security Agency (DCSA). Broadleaf, Inc. Army’s Aberdeen Proving Ground (APG), the U.S.
Take note of what these wins may mean for your competition, including how they impact competitor standings in certain agencies and the success stories they can leverage for future bids. This post is a follow-up of our November 2020 blog , which highlighted some of the major wins and losses at the end of FY2020. Highlights of major wins.
Work on the contract will focus on systems used for command, control, computers, communications, cyber, intelligence, surveillance and reconnaissance exercises, operations and information services, Parsons said in a May 5 statement. by collecting, analyzing and delivering foreign intelligence and counterintelligenceinformation.
This enabled ASRC Federal to bid on set-aside and sole-source contracts, in which federal agencies limit contract competition to contractors that are registered as small, minority and disadvantaged businesses. Government’s Small Business Administration’s (SBA) 8(a) program. Core Federal Customers and Notable Contract Wins.
Emerging Competitors in FEDSIM Procurements Even though competing to win GSA FEDSIM contracts is challenging due to the complexity of their RFPs, the competitive landscape is expanding. ManTech, Deloitte, Leidos, and Parsons are emerging as formidable competitors in FEDSIM procurements. Obligated: $0M* Ceiling: $2.3B
Department of the Air Force, the Defense Information Systems Agency (DISA), Cybersecurity & Infrastructure Security Agency (CISA), Environmental Protection Agency (EPA) and the U.S. Source: sam.gov In comparing GDIT’s customer portfolio between FY2018-FY2020 and FY2021-2023, we can see that the U.S. Army became the company’s top customer.
SCIP Insights The End of the Classical Competitive Intelligence: Launching the Era of Generative CI Whether for countries or companies, the primary goal of all competitive intelligence (CI) operations is to gain an advantage. This is your introduction to the complex world of CI in the age of GenAI. We call it generative CI (GenCI).
So the fact that open-source information can be combined by clever people is not a new fact. So if you were to just release those numbers, then an evil person/company/country could easily replicate all of that information and misuse it in a really bad way. How is that going to reshape global competition around these technologies?
SCIP Insights The Power of Counterintelligence: Protecting Your Business from Competitor Espionage In a world where information is essential, protecting your business from competitor espionage is more critical than ever. Regular audits and security assessments can help organizations stay ahead of potential threats.
We organize all of the trending information in your field so you don't have to. Join 11,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content