Leidos Airport Solutions Infographic
Learn the 10 different Leidos airport solutions in this infographic
Other content in this Stream
Enterprise IT Overview
Leidos is a recognized leader in enterprise IT modernization; #1 on the Top 100 information technology and system integration contractors list by Washington Technology
OES Distinguished Technical Achievement Award: 'Icing on the cake' for Dr. Peter Mikhalevsky
A senior scientist with Leidos, Dr. Mikhalevsky received the Institute of Electrical and Electronics Engineers' Oceanic Engineering Society's DTA award. Learn more about his 45-year career in our Q&A.
The Cyber Workforce, Part 5: What does success look like?
Over the course of this series, we've discussed the need for more cybersecurity professionals and how we must look for new talent to build dynamic teams. But what does success look like?
Dos and don’ts for building an effective ICS security program
For security teams, monitoring the security status of an IT network is common practice, while the routers, switches, and gateways of industrial networks go largely unchecked. Fortunately, this is...
The Cyber Workforce, Part 4: Successful candidates aren't one-size-fits-all
Even though it’s a highly technical field in many aspects, cybersecurity has several elements that lend themselves toward people from many different backgrounds.
The Cyber Workforce, Part 3: Striving for cognitive diversity
Too often, the cyber industry exhibits a recruiting bias toward computer science or engineering majors for careers in cybersecurity. As a result, we almost immediately lose diversity of thought.
Biometric solutions for an identity-driven world
Learn what individuals can do more securely and efficiently with biometric solutions. Biometric matching – verifying a person's identity through unique biological characteristics.
[Part 4 of 4] Why Training and Consequence Management Matter to Insider Risk Programs
Discover why the best insider risk programs incorporate training, awareness, and defined consequence management procedures to ensure success.
Top 5 Considerations for an Affiliate Healthcare Partnership
A successful affiliate program doesn’t happen at the press of a button, but what are the 5 key considerations for this critical investment?
India's Aadhaar program a foundation for others to follow
Biometric ID systems can serve as a proof of identity while also protecting privacy. Learn more about India's nationwide Aadhaar digital identity project.
Security and efficiency: You don't have to choose
Every mode of travel that involves leaving one country to enter another poses an inherent challenge to governments: Make sure that everyone who crosses their border is in fact who they say they are.
Why biometrics matter in international travel
Verifying the identity of travelers is crucial to public safety and security. Adding biometrics is an accepted way to mitigate forgery and manual error making travel safer for all.
The Cyber Workforce, Part 2: How we build capacity
Finding, building, hiring, retaining, and energizing our workforce has become one of the most challenging tasks in the cyber domain.
[Part 3 of 4] What Deserves the Greatest Protection
Successful insider risk programs begin with good choices—prioritizing what to protect and how to protect it. Part 3: Successful insider risk programs begin with good choices—prioritizing wha
[Part 2 of 4] Set the foundation for your insider risk program success
Part 2: Communication and documentation contribute to building a successful insider risk program. When implementing an insider risk program, it is necessary to take foundational...
Balancing the need for cybersecurity with the desire for innovation
We all recognize the need to protect organizations from cybercrime, but does that have an adverse impact on our ability to strive for innovation?
The ITIL barrier to DevOps success
The DevOps movement has renewed excitement in the IT industry and began bridging the expectation gap between business, development and IT infrastructure teams.
[Part 1 of 4] How to kick-off your insider risk program
Part 1: Review the first two of eight components to building a successful insider risk detection program that goes beyond network monitoring. One of the most common questions posed by...
The Cyber Workforce, Part 1: Where we are and where we need to be
This is the first in a five-part series that analyzes the current and future state of the cybersecurity workforce.
4 Insights on Global Cybersecurity Challenges Directly from the CISOs