21 Aug 2020 Information Technology cybersecurity hackers IIoT DDoS cybercrime malware phishing spyware whaling data breach cyber hygiene penetration testing security audit identity management ransomware How are Government Agencies Handling Cybersecurity Problem? Cybersecurity attacks are on the rise and are being highlighted and discussed everywhere. For good reason. Over the many years of reporting on various industries,
31 Oct 2018 BidPrime News amended complaint Crazy Bids cybersecurity digital healthcare solutions hackers intelligent transportations systems ITS Newsletter password resource phishing scammers security The Big Bid Theory what's trending BidPrime Quarterly Edition: 11, 2018 - Q3 In our quarterly newsletter, we take a look at recent issues that are important to public sector business. Also, we take the opportunity to introduce
17 Nov 2016 Information Technology Crazy Bids cyber attacks cyber security hackers information security lance hayden Podcast The Big Bid Theory Present and Future of Cyber Attacks and Your Business. An Exceptional #CrazyBids. Wait, What? Dr. Lance Hayden is back with more on how you can protect your business from hackers. He also looks into the crystal ball on the
09 Nov 2016 Information Technology computer security Crazy Bids cyber security cyberattacks enterprise security hackers Podcast privacy The Big Bid Theory Computer Security Starts with You and a Crazy Bids to Make You Say Moo Is it time for you to implement a computer security program? Part 1 of our visit with Dr. Lance Hayden. Lance is a former CIA
15 Jul 2015 Information Technology bid requests Bids business business growth cyber cyber attacks enterprise Federal Government government government bids government contracting government contracts government program hackers Homeland Security I.T. security I.T. security services infrastructure networks new business development OPM purchasing Research RFPs risk management SCADA security State and Local How are Governments Tackling I.T. Security, Cyber Attacks, and Hackers? Round 2. It would be wildly unrealistic to imagine that the recent reports of cyber attacks on U.S. government agencies would dwindle and go quietly into