US Defense Intelligence Agency Upgrades Cybersecurity

The US intelligence branch has been reinforcing its cyber-security.

General Dynamics Information Technology, a business unit of General Dynamics, was awarded a task order by the US Defense Intelligence Agency (DIA) to provide a wide range of cyber security services required to defend intelligence networks and systems for the Agency, Combatant Commands and various Military Services.

The Enterprise Cyber Network Defense contract has a five-year ordering period of $170 million. According to gdit.com, General Dynamics base their knowledge on in-depth training, industry-recognized certifications and management skills in order to ensure cutting edge cyber security.

According to General Dynamics’ site, the company will provide a variety of technical, functional and managerial services, while emphasizing the ever-growing demand for quality cyber security engineering and incident detection services.

Work on the contract will be performed within the Northeast, National Capitol and Pacific regions; Norfolk, Va.; Pearl Harbor, Hawaii; and multiple locations in the United Kingdom.

The company says it has decades of experience with the defense, intelligence, homeland security and federal agency cyber security communities.

It offers enterprises and organisations the design and integration of security solutions. Full lifecycle capabilities range from assessments and architectures, operational support to solutions combining best-of-breed and state-of-the art technology.

Delivering a multi-level protection, the company’s technology correlates information on millions of cyber events to identify critical actionable incidents.

“The company will continue to provide state-of-the-art cyber defense to support the DIA’s enterprise, networks and security domains,” said Bernie Guerry, Senior Vice President of General Dynamics Information Technology’s Intelligence Solutions division. “We will deliver exceptional support to the DIA worldwide against an increasingly challenging cyber threat.”

I-HLS

 

« CIA Silent About Wikileaks Agency Files
Empty Cars/Taxis With No Steering Wheel »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Information Security Media Group (ISMG)

Information Security Media Group (ISMG)

Information Security Media Group is the world’s largest media organization devoted solely to information security and risk management.

Crest International

Crest International

Crest is focused on professionalizing the technical cyber security market whilst driving quality and standards of organizations that operate within it.

Inky Technology Corp

Inky Technology Corp

Inky® Phish Fence is an email protection gateway that uses sophisticated AI, machine learning and computer vision algorithms to block deep sea phishing attacks that get through every other system.

Zivaro

Zivaro

Zivaro provides transformational consulting and technology services to help clients attain real business value from their technology investments.

Cybercrime Support Network (CSN)

Cybercrime Support Network (CSN)

CSN is a public-private, nonprofit collaboration created to meet the challenges facing millions of individuals and businesses affected each and every day by cybercrime.

Clari5

Clari5

Clari5 redefines real-time, cross channel banking Enterprise Fraud Management using a central nervous system approach to fight financial crime.

Council to Secure the Digital Economy (CSDE)

Council to Secure the Digital Economy (CSDE)

CSDE brings together companies from across the ICT sector to combat increasingly sophisticated and emerging cyber threats through collaborative actions.

ACROS Security

ACROS Security

ACROS Security is a leading provider of security research, real penetration testing and code review for customers with the highest security requirements.

Eclypsium

Eclypsium

Eclypsium protects organizations from the foundation of their computing infrastructure upward, controlling the risk and stopping threats inside firmware of laptops, servers, and networks.

ERI

ERI

ERI is the largest fully integrated IT and electronics asset disposition provider and cybersecurity-focused hardware destruction company in the United States.

Ackcent Cybersecurity

Ackcent Cybersecurity

Ackcent's mission is to help our clients to protect their critical digital assets by providing them with a portfolio of specialised professional services.

Socure

Socure

Socure’s identity verification increases auto approval rates, reduces false positives and captures more fraud. In real time.

Industrial Control System Information Sharing and Analysis Center (ICS-ISAC)

Industrial Control System Information Sharing and Analysis Center (ICS-ISAC)

ICS-ISAC is a non-profit, public/private Knowledge Sharing Center established to help facilities develop situational awareness in support of local, national and international security.

Wizard Cyber

Wizard Cyber

At Wizard Cyber, we simplify cyber security, delivering an advanced service that protects your high-risk assets from the complex threats that technology alone can miss, 24/7.

Cegeka

Cegeka

Cegeka is a family-owned IT company providing end-to-end IT solutions, services & consultancy.

Hudson Rock

Hudson Rock

Hudson Rock’s products — Cavalier & Bayonet — are powered by our cybercrime database, composed of millions of machines compromised by Infostealers in global malware spreading campaigns.