Latest stories

  • in

    CACI Veteran Rob Warren Joins ECS as Capture VP

    Rob Warren, former chief growth officer for enterprise information technology, federal civilian solutions at CACI International, was appointed vice president of capture at ECS. He is responsible for leading a team of capture managers tasked to pursue multimillion business opportunities with government customers. More

  • in

    Maximus Hires Raymond Holder as Digital Growth VP

    Raymond Holder, a more than two-decade government market veteran, has joined Maximus to serve as vice president of digital growth. Holder previously held various roles at Amazon Web Services, DXC Technology and Hewlett Packard Enterprise. More

  • in

    Red Hat VP Mike Miller Lends Insight About Industry-Government Technology Partnership Goals, IT Trends & More

    At Red Hat, Mike Miller leads teams that deliver cloud-based solutions, high-performing Linux applications, containers and Kubernetes technologies to help solve complicated problems for the government.In this Executive Spotlight interview, Miller spoke with ExecutiveBiz about the most pressing technological conundrums facing the U.S. today, the solutions of tomorrow in this market and what he has learned about cross-sector partnership over the years, among other topics. More

  • in

    Red Hat VP Mike Miller Lends Insight About Industry-Government Technology Partnership Goals, IT Trends & More

    At Red Hat, Mike Miller leads teams that deliver cloud-based solutions, high-performing Linux applications, containers and Kubernetes technologies to help solve complicated problems for the government.In this Executive Spotlight interview, Miller spoke with ExecutiveBiz about the most pressing technological conundrums facing the U.S. today, the solutions of tomorrow in this market and what he has learned about cross-sector partnership over the years, among other topics. More

  • in

    Red Hat VP Mike Miller Lends Insight About Industry-Government Technology Partnership Goals, IT Trends & More

    At Red Hat, Mike Miller leads teams that deliver cloud-based solutions, high-performing Linux applications, containers and Kubernetes technologies to help solve complicated problems for the government.In this Executive Spotlight interview, Miller spoke with ExecutiveBiz about the most pressing technological conundrums facing the U.S. today, the solutions of tomorrow in this market and what he has learned about cross-sector partnership over the years, among other topics. More

  • in

    LexisNexis’ Haywood Talcove Says Criminal Groups Use Generative AI for Fraud-for-Hire Schemes

    Haywood Talcove, CEO of LexisNexis Risk Solutions' Government Group, said international criminal groups from countries including Russia, Nigeria and China are using generative artificial intelligence to commit fraud and other illicit activities. Talcove cited a recently uncovered fraud-for-hire commercial posted on the dark web by a multibillion-dollar criminal organization that has been providing generative AI capabilities to other criminals. More

  • in

    LexisNexis’ Haywood Talcove Says Criminal Groups Use Generative AI for Fraud-for-Hire Schemes

    Haywood Talcove, CEO of LexisNexis Risk Solutions' Government Group, said international criminal groups from countries including Russia, Nigeria and China are using generative artificial intelligence to commit fraud and other illicit activities. Talcove cited a recently uncovered fraud-for-hire commercial posted on the dark web by a multibillion-dollar criminal organization that has been providing generative AI capabilities to other criminals. More

  • in

    SpiderOak’s John Moberly: OrbitSecure Brings Data Protection Capabilities for Space Systems

    John Moberly, senior vice president for space at SpiderOak, highlighted the capability of the company's OrbitSecure software to provide end-to-end data protection for satellite systems and other space assets of defense customers. "Yes, we protect the data that enters the satellite, the data that leaves the satellite, and the data that belongs to the satellite. But we are also protecting the uplink, the downlink, the ground stations, the antennas, and the terminals," Moberly said in an interview with Satellite Evolution. More