Remove Cyberspace Remove Learning Remove Security
article thumbnail

Competition is stiff, but retailers know what it takes to compete

CIO

Challenge: Maintaining security is a moving target The highly distributed nature of retail and complex supply chains, along with increasingly sophisticated ransomware and fraud tactics and the growth of organized retail crime schemes, are driving up the risk of retail cyber events. IDC, June 2024).

Retail 243
article thumbnail

2 Innovations That Can Tip the Balance in Cybersecurity

CIO

Army Major General and Vice President and Federal Chief Security Officer for Palo Alto Networks What critical innovations can change the balance in cybersecurity, providing those of us responsible for defending our organizations with more capabilities against those who would do us harm? By John Davis, Retired U.S. government.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Proactive cybersecurity: sometimes offence is the best defense

CIO

It’s important to understand that launching an offensive cybersecurity strategy does not mean abandoning traditional defensive measures such as deploying firewalls, intrusion detection systems (IDS), anti-malware software, patch management, security information and event management (SIEM), and other such tools.

article thumbnail

CIOs sharpen tech strategies to support hybrid work

CIO

This include technologies that enable them to replicate in cyberspace the personal connections and spontaneous collegiality that more easily happen in person, as they seeking experiences that are consistent regardless of where they’re working on any given day. “So

article thumbnail

Empowering cyber resilience in education: Three strategies for the future

CIO

People learn a lot by talking to colleagues and friends. Another advantage of adopting a shared responsibility model is to leverage the security capabilities of your cloud service providers. Companies like AWS, Microsoft, and Google invest heavily in securing their cloud products.

Education 243
article thumbnail

Competitor Highlights: Parsons

FedSavvy

National Security Agency (NSA), SHARKSEER Program, Vulnerability Analysis Operations II ( VAO II ) – In 2011, Parsons designed, built, tested and operated this aspect of the SHARKSEER system, which improves DoD cyber posture by using artificial intelligence (AI) to scan incoming traffic for vulnerabilities.

article thumbnail

Deloitte…Their Changes, Investments and Contract Wins…Oh My!

FedSavvy

Over the last two years, Deloitte has ramped up investments in data, analytics, cyber, and artificial intelligence and machine learning (AI/ML) to fulfill emerging customer needs. Deloitte has successfully secured wins with a focus on AI/ML and data analytics. Source: sam.gov. AI/ML, Analytics and Cyber Offerings.

Win 130