On February 11, Palo Alto Networks completed its acquisition of CyberArk, establishing Identity Security as a core pillar of its…
On February 10, By Light Professional IT Services LLC, a provider of modeling, simulation and cyber products and solutions and…
The United States faces persistent cyber campaigns that threaten both public and private sectors, directly impacting the security and privacy…
On January 29, SpyCloud, the leader in identity threat protection, marks the start of their tenth year of disrupting cybercrime…
On February 5, ICF announced that it has achieved Cybersecurity Maturity Model Certification (CMMC) Level 2. This certification confirms ICF’s…
On February 9, KBR announced it has been awarded two firm-fixed-price task orders totaling $103 million under the United States…
On February 3, Trout Software, a provider of proxy-based security for Operational Technologies (OT) and legacy systems, and Carahsoft Technology Corp….
With computing systems in the Department of War and other federal agencies under constant threat, Leidos and RegScale are integrating Leidos’ UpHold Armor and RegScale’s Continuous Controls Monitoring…
On February 4, System High Corporation, a Ridgeline International company, announced that it has expanded support through a P2 Compliance…
On January 20, the Department of the Navy, Naval Information Warfare Center Pacific (NIWC Pacific) issued a presolicitation notice for…











