enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. NetCentrics - Wikipedia

    en.wikipedia.org/wiki/NetCentrics

    NetCentrics [1] provides enterprise IT, cloud and cybersecurity services to government and private industry. The headquarters are located inside the Dulles Technology Corridor of NoVA. The workforce is a combination of on-site and off-site employees. Many employees are remote workers [2] from the greater National Capital Region and

  3. Datto (company) - Wikipedia

    en.wikipedia.org/wiki/Datto_(company)

    Datto, Inc. is an American cybersecurity and data backup company. [2] [3] In 2017, it was acquired by Vista Equity Partners. [4]In 2022, it became a subsidiary of Kaseya.. Datto builds hardware and software for both data backup and recovery purposes.

  4. UWF Center for Cybersecurity awarded $1.3M contract to ... - AOL

    www.aol.com/uwf-center-cybersecurity-awarded-1...

    PENSACOLA, Fla. (WKRG) — The Cybersecurity and Infrastructure Security Agency has awarded a $1.3 million contract to the University of West Florida’s Center for Cybersecurity, News 5 has learned.

  5. Cybersecurity and Infrastructure Security Agency - Wikipedia

    en.wikipedia.org/wiki/Cybersecurity_and...

    The Cybersecurity and Infrastructure Security Agency (CISA) is a component of the United States Department of Homeland Security (DHS) responsible for cybersecurity and infrastructure protection across all levels of government, coordinating cybersecurity programs with U.S. states, and improving the government's cybersecurity protections against private and nation-state hackers. [4]

  6. Hewlett-Packard Company Gets Homeland Security Cybersecurity ...

    www.aol.com/2014/02/26/hewlett-packard-company...

    Today, Hewlett-Packard announced it has received a cybersecurity contract awarded by the U.S. Department of Homeland Security to assist 33 different governmental agencies in their efforts to ...

  7. Assured Compliance Assessment Solution - Wikipedia

    en.wikipedia.org/wiki/Assured_Compliance...

    It performs automated vulnerability scanning and device configuration assessment. ACAS was implemented by the DoD in 2012, with contracts awarded to Tenable, Inc. (then known as Tenable Network Security) and Hewlett Packard Enterprise Services to improve cybersecurity within the DoD. It is mandated by regulations for all DoD agencies and is ...

  8. UST (company) - Wikipedia

    en.wikipedia.org/wiki/UST_(company)

    UST offers services in many areas including: digital transformation, [13] cybersecurity, data analytics, data engineering, technology and digital consulting, supply chain management, cloud infrastructure, developer productivity, quality engineering, IT talent sourcing, innovation as a service, legacy modernization, human-centered design, AMS, semiconductor engineering, IOT engineering ...

  9. Checkmarx - Wikipedia

    en.wikipedia.org/wiki/Checkmarx

    Checkmarx's research department is known for uncovering technical vulnerabilities in popular technologies, software, applications, and IoT devices. [3]In November 2019, the company's security research team uncovered a number of vulnerabilities affecting Google and Samsung smartphones.