Remove Cyberspace Remove Intelligence Remove Management
article thumbnail

Competition is stiff, but retailers know what it takes to compete

CIO

Retailers plan to focus on improving supply chain planning, warehouse/inventory management, and integration between supply chain planning and execution during the coming year to meet these challenges. of survey respondents); supplier selection and management (34%); inventory and order management (35.9%); and design and pre-production (35.7%).

Retail 243
article thumbnail

Progress in ICT industry policy and cybersecurity standards drive MENA and Central Asia toward an intelligent era

CIO

It also explored how carriers, enterprises, oversight agencies, and regulators can enhance mobile security capabilities and provide guidance for risk management strategies. These developments can help address the barriers in the journey towards a fully connected, intelligent world.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

3 Strategies Employed by the Leading Enterprise Cybersecurity Platforms

Smart Data Collective

To get acquainted with the ways security firms are handling the new breed of threats in cyberspace, here’s a rundown of the notable strategies the leading cybersecurity platforms and security firms are offering. BAS is one of the top features in security posture management platforms for enterprises. Breach and attack simulation.

article thumbnail

Proactive cybersecurity: sometimes offence is the best defense

CIO

It’s important to understand that launching an offensive cybersecurity strategy does not mean abandoning traditional defensive measures such as deploying firewalls, intrusion detection systems (IDS), anti-malware software, patch management, security information and event management (SIEM), and other such tools.

article thumbnail

CIOs sharpen tech strategies to support hybrid work

CIO

Technologies cited by IDC include intelligent space and capacity planning tools, which the firm predicts 55% of global enterprises will use to reinvent office locations by 2024. Coupled with this effort is a cohesive change management process to ensure effective employee communication and adoption of new technologies.”

article thumbnail

What Are State-Sponsored Cyber Attacks and Do They Use AI?

Smart Data Collective

Artificial intelligence has played a very important role in modern cyber attacks. As the world’s top institutions and critical infrastructures digitally transform and reap the benefits of better, more efficient workflows thanks to modern cyberspace, cybercrime threats have also gained the ability to transcend into the physical.

article thumbnail

Competitor Highlights: Parsons

FedSavvy

Parsons is a diverse contractor with work spanning from engineering, construction, and facilities management to information technology, cybersecurity, and intelligence work. Note that reliable spending data on the Intelligence Community is not available. Facility Operations and Management. Customs and Border Protections.