Cyber and Intelligence Archives - Parsons Corporation Infrastructure, Defense, Security, and Construction Tue, 24 Mar 2026 20:08:55 +0000 en-US hourly 1 Forging Ahead In The Indo Pacific: Parsons Mission in Hawaii /2026/03/forging-ahead-in-the-indo-pacific-parsons-mission-in-hawaii/ Mon, 02 Mar 2026 13:18:30 +0000 /?p=34323 The Indo-Pacific is one of the most important regions shaping global security today. It is a place where major powers operate, where threats evolve quickly, and where strong partnerships matter. […]

The post Forging Ahead In The Indo Pacific: Parsons Mission in Hawaii appeared first on Parsons Corporation.

]]>
Parsons Hawaii

Estimated reading time: 3 minutes

The Indo-Pacific is one of the most important regions shaping global security today. It is a place where major powers operate, where threats evolve quickly, and where strong partnerships matter. In Episode 10 of Meet the Mission, host Candice Scarborough interviews Kenny Whitesell and Yun Yi to explore how we are strengthening our role in this dynamic region.

Driving Mission Impact Across Domains

We have a long history in Hawaii, beginning with critical infrastructure projects. That foundation now extends across defense, intelligence, cyber, and space missions. Today, we support airport modernization, rail development, smart highways, electronic warfare training, and space domain awareness.

These efforts help address the Indo-Pacific’s complex challenges, including vast distances, contested environments, and the need for rapid and informed decision-making. Our on-island presence strengthens collaboration with U.S. and allied forces. Additionally, our tools and platforms help connect data, systems, and partners across domains.

Episode Overview

  • 0:00 – 4:31: Welcome, Introductions & Hawaii Context – Opening of the episode, introduction to the Indo Pacific mission focus, and early discussion about living and working in Hawaii.
  • 4:32 – 10:23: Parsons Presence, Growth & Regional History – Kenny and Yun discuss their personal experiences, the company’s early work in Hawaii, and how our presence on Oahu has evolved over time.
  • 10:24 – 15:03: Why The Indo Pacific Matters Strategically – Overview of regional significance, the pivot to the Pacific, geopolitical drivers, and the emerging focus on partnerships and sensing.
  • 15:04 – 20:58: The Tyranny Of Distance & Regional Complexity
    Exploring logistics challenges, maritime complexity, contested environments, and why presence is essential for mission success.
  • 20:59 – 29:13: Key Parsons Capabilities Across The Pacific – Discussion of C2 Core, electronic warfare training, space operations, infrastructure programs, and support during critical events like the Lahaina fires.
  • 29:14 – 38:26: Leadership Insights, Joint Operations & Integration – How naval and joint experience informs region‑wide strategy, how we align to Indo Pacific priorities, and how we integrate with industry partners.
  • 38:27 – 42:03: Partnerships, Interoperability & Regional Investment – Improving information sharing, working with allies, the Pacific Deterrence Initiative, and the importance of our new Honolulu headquarters.
  • 42:04 – 47:51: Future Challenges & Opportunities Ahead – Looking at emerging threats, future mission requirements, one Parsons collaboration, and opportunities for growth across cyber, space, and EW.
  • 47:52 – End (~51:30): Key Takeaways & Closing – Final messages from Kenny and Yun, themes of connection and commitment, and episode close.

Looking Ahead With One Parsons

“Our presence defines our commitment in Hawaii. We’re here, we’re credible, and we’re consequential. We’re not just a sidebar on the island.” Kenny Whitesell, VP, INDOPAC Strategy and Growth

As regional dynamics continue to evolve, we are preparing for the future through sustained investment in people, technology, and infrastructure in Hawaii. Our one Parsons approach brings together cyber, space, electronic warfare, and critical infrastructure expertise. This supports the full spectrum of mission needs across the Indo-Pacific.

Tune In and Join The Conversation

Check out the full episode on YouTube, Spotify, or Apple Podcasts!

The post Forging Ahead In The Indo Pacific: Parsons Mission in Hawaii appeared first on Parsons Corporation.

]]>
Parsons Hosts Emerging Spectrum And EW Technologies Open House At APG PALADIN Lab /2026/02/parsons-hosts-emerging-spectrum-and-ew-technologies-open-house-at-apg-paladin-lab/ Tue, 03 Feb 2026 15:23:06 +0000 /?p=33680 Learn about the innovations demonstrated at PALADIN Lab's open house, enhancing Army capabilities in cybersecurity and Electronic Warfare.

The post Parsons Hosts Emerging Spectrum And EW Technologies Open House At APG PALADIN Lab appeared first on Parsons Corporation.

]]>
Estimated reading time: 5 minutes

Paladin Lab

We recently hosted an RF spectrum emerging technologies technical exchange open house at our Aberdeen Proving Ground (APG), Maryland based PALADIN Lab on January 28th, 2026.

Parsons teams and nine of our industry partners demonstrated emerging technologies, including spectrum sensing and awareness, signature management, SIGINT, cybersecurity, miniature SDR, and Electronic Warfare (EW) capabilities, to government leaders and engineers from the APG C5ISR Community.

The open-house-style event enabled extensive technical conversations that participants recognized as very relevant and valuable to their mission. Furthermore, this event was the latest in the Parsons Tech Demo Series that we host. The series helps accelerate the development and delivery of emerging technologies in support of the Army’s C5ISR mission.

What Is The PALADIN Lab?

Designed to foster new technologies and capabilities for the warfighter, PALADIN Lab, owned and operated by Parsons Corporation, is located on Aberdeen Proving Ground, MD. From here, this innovation incubator connects industry, academia, and the Department of Defense. This connection enables us—and our customers—to leverage imaginative people and open, available technology. As a result, we can answer the DoD’s biggest challenges. 

The PALADIN Lab provides a low-risk venue where the government and industry can collaborate to prototype proofs of concepts, emerging hardware, algorithms, and software technologies with existing government architectures. Through this process, the government can rapidly determine which commercial capabilities are worth pursuing. The process also reveals which technologies don’t translate well to DoD requirements.

About The Author

Dr. David Tyler is VP of C5ISR Solutions at Parsons and an energetic, collaborative leader with over 35 years of leadership and program management experience in C5ISR systems engineering, integration, sustainment, training, technical support and operations; education; and leader development. His leadership approach is a mentoring style of leadership that directs, teaches, coaches, and motivates team members to offer their own unique skills and talents to collaborate as a team in achieving the organization’s goals and objectives. He focus on positively communicating and engaging with the leaders and employees within the organization, building relationships, collaborating with external stakeholders, and creating a jointly developed vision that guides everyone’s actions towards a common goal.

The post Parsons Hosts Emerging Spectrum And EW Technologies Open House At APG PALADIN Lab appeared first on Parsons Corporation.

]]>
Beyond Fear: Rethinking AI-Driven Cyber Threats /2025/11/beyond-fear-rethinking-ai-driven-cyber-threats/ Mon, 24 Nov 2025 17:08:01 +0000 /?p=32514 Explore the Anthropic vulnerability report that reveals AI-driven cyber threats and their implications for cybersecurity.

The post Beyond Fear: Rethinking AI-Driven Cyber Threats appeared first on Parsons Corporation.

]]>
Abstract background concept of cyber security and attack, system crash representing Anthropic Vulnerability Report.

Estimated reading time: 6 minutes

Over the last couple weeks the cybersecurity community has been abuzz about the recently released report from Anthropic outlining their detection and disruption of an AI-orchestrated nation-state cyber campaign. It seemed, for at least 72 hours after the release of the report, you couldn’t peruse LinkedIn or your favorite cybersecurity news outlet without being bombarded with summaries, opinion pieces, or “deep dives.” The tone of these articles is ominous: “We’ve reached a point where cyber actors can simply release AI to do their bidding.” I’ll admit that, at face value, the premise is frightening. But as I spent time deliberately thinking about the implications and consuming the full report, I think we need to see this as a true moment of awakening, not of fear.

A Summary Of The Report By Anthropic

The report outlines that a Chinese nation-state actor, dubbed GTG-1002, leveraged Anthropic’s AI capability, Claude Code, to execute a six-phase attack across thirty targets spanning tech, financial, and government institutions. More importantly, they completed successful intrusions and exfiltration of data against a handful of the targets. I encourage all cybersecurity professionals (or any inquiring mind) to read the full report from Anthropic to truly understand how the attack was executed.

Rather than rehash the report here, I wanted to focus on four of my key takeaways, emphasizing the need for network owners and operators to be more proactive in their cyber defense posture.

Four Key Takeaways From The Report

1. Speed And Automation

Most of the thought pieces on this report that I’ve read focus heavily on the level of automation seen in this attack. They express concern about the scale at which these attacks can be achieved. But I offer this: many of the actions for exploitation were able to be automated before the introduction of AI. Cybersecurity researchers had non-AI tools at their disposal already. These tools enable them to define a target space and automate vulnerability scanning to exploitation without the need to write any code.

However, the approach outlined in the report—using agentic AI to rapidly map targets, evaluate and research vulnerabilities, and execute multi-stage exploitation—represents a significant increase in the speed at which these tasks can be completed.

No longer does a human need to interpret data gathered at every step; the AI solution summarizes findings and even makes operational suggestions, allowing the operators to “click to execute” faster than ever before.

2. Closing The Skill Gap

More frightening than the speed factor is the reduction in technical skill required to execute an attack at scale. Even with previous automation tools at their disposal, nation-state-level cyber actors required significant expertise and technical know-how to be successful in operational settings.

Anthropic’s report highlights that nation-state operators could simply be trained in a set of operating procedures to follow, rather than needing to understand the technical details of any exploit being performed. The operators simply needed to approve actions for the agentic AI to execute, e.g., “Would you like Claude to continue an attempt to gain access to the target?” These capabilities now act as force multipliers in two ways: increased speed of execution and an expanded pool of capable operators.

3. Detection And Mitigation

I’ve been on a soapbox for years that signature-based intrusion detection systems are insufficient in protecting your network. They have a finite detection aperture, only as good as the signatures that have been developed for them. To truly have comprehensive coverage, behavior- and heuristics-based solutions must be paired with your signature-based systems.

I believe there’s still significant work to be done in this arena. Capabilities that can build a continuously updated understanding of what is normal for your network are needed. They should track anomalous events, correlate multiple events together, and rapidly cross-check those events against known adversary Tactics, Techniques, and Procedures. These, like those categorized in the MITRE ATT&CK framework, need to become the norm for intrusion detection.

Upon detection, systems must be able to execute automated mitigations to keep up with the speed of attack execution. Gone are the days of events being pushed to an analyst in your Security Operations Center and awaiting them to complete analysis to push a mitigation.

The volume of events to be analyzed will bury those analysts, and cyber actors will have achieved their desired outcomes before the “block” button can be pushed.

4. Vulnerability Prioritization

The Anthropic report did not appear to highlight the exploitation of any zero-day vulnerabilities. This, to me, is a key element here. The attacker’s approach was to identify known vulnerabilities through scanning and reconnaissance and then develop exploits against those identified vulnerabilities.

Lacking in the report is any detail on whether the developed exploits were truly novel or if they were based on pre-existing exploits. What’s safe to assume, though, is that based on how these LLMs are trained and work at a foundational level, they’re going to be much more capable of developing working exploits against vulnerabilities. Especially those that already have exploits found on the open internet.

It’s of utmost importance now to be deliberate in your vulnerability management and think bigger when it comes to vulnerability prioritization. Too often, we see companies simply patching those vulnerabilities that are listed as Critical within the National Vulnerability Database. Now, more than ever, it’s important to apply analytic tradecraft and include risk evaluation in your vulnerability prioritization. You must ensure that you emphasize patching vulnerabilities with known exploits. ExploitDB, Metasploit, and CISA’s Known Exploited Vulnerabilities catalog are some easy sources to leverage for this information.

In Closing

Anthropic’s report is a stark reminder of the evolving threat landscape. AI-driven cyber campaigns are no longer a distant possibility—they are here. To stay ahead, organizations must embrace proactive defense strategies, automate detection and mitigation, and rethink vulnerability management. This is not a time for fear, but for action and adaptation.

About The Author

Mr. Holden Silvia is Vice President and CTO of National Security & Operations withing Parsons’ Defense and Intelligence business unit. Mr. Silvia’s 14-year professional career has spanned across multiple software and system engineering disciplines including software architecture, big data, streaming and graph analytics, cloud computing, network forensics, defensive cyber operations, multi-domain data processing, and ML/AI. He is a recognized subject matter expert in analytic capability development and participates in industry working groups focused on innovation through the automation of data processing. His last 10 years of work have been focused on delivering analytics and capabilities to support cybersecurity analysts and network defense operators, enabling them to act faster and with increased confidence. As a member of a Parsons distinguished Fellows program, Mr. Silvia is one of Parsons’ foremost experts in cybersecurity.

The post Beyond Fear: Rethinking AI-Driven Cyber Threats appeared first on Parsons Corporation.

]]>
The High Stakes Of Data Center Buildouts  /2025/09/the-high-stakes-of-data-center-buildouts/ Wed, 10 Sep 2025 19:48:02 +0000 /?p=31680 Learn how to navigate a successful data center buildout, minimizing risks and keeping your systems running smoothly.

The post The High Stakes Of Data Center Buildouts  appeared first on Parsons Corporation.

]]>

Estimated reading time: 7 minutes

Imagine this: You’re standing in the middle of a cavernous white space, surrounded by rows of humming servers. It’s the beating heart of your soon-to-be-finished data center. The next needed block in the 21st century digital infrastructure, powering everything from our favorite streaming platforms to the AI tools reshaping industries. 

Now imagine one of those servers overheating, a cooling system failing, or a commissioning deadline slipping by just a few weeks. The result? Downtime. Angry stakeholders. Money lost. And a whole lot of finger-pointing. 

According to Uptime Institute’s recent global survey, more than half of significant data center outages now cost over $100,000, and one in five cost more than $1 million—a number that continues to climb as the world’s digital infrastructure becomes more critical and complex.

For anyone building, expanding, or commissioning a data center in the next 18 months: this is for you. 

What It Takes To Build A Data Center

Building or converting a data center is a high stake balancing act. Every decision, from cooling systems to power draw assumptions, carries the weight of potential disaster. And the margin for error? It’s thinner than the fiber optic cables running through the walls. 

That’s where Parsons steps in. We’re the team you call when failure isn’t an option. With decades of experience in data center buildouts, brownfield conversions, and advanced digital infrastructure projects, we anticipate problems before they become big ones. From design to commissioning, we ensure your data center is operational on Day 1, without surprises, delays, or budget blowouts. 

Let’s break down the biggest challenges and why they are the difference between a data center that hums and one that hiccups. 

The Challenges That Keep Data Center Builders Up at Night 

Every piece of equipment needs to be calibrated and fit perfectly when building a data center. And every element of your design, from the walls to the floorplan to the air flow, will affect every other piece. You’re building a technological ecosystem. Miss one detail and you’re looking at downtime, blown budgets, or worse. 

Most clients don’t walk into a project knowing exactly what they need. Especially when retrofitting or converting a space. One client imagined a 60 MW facility…eventually. But what did they need on Day 1? Year 3? Year 10? 

Parsons guides clients through the uncertainty, modeling multiple layout and capacity options before a single cable gets pulled. For a recent brownfield conversion, our team developed over a dozen floorplan variants, testing rack densities, power assumptions, and future growth pathways. Why? Because early evaluation is where efficiency is born and waste is prevented. 

Here are the challenges that can make or break any new build out project—and why Parsons makes sure they don’t become your reality: 

1. Cooling Systems: The Silent Budget Killer 

Data Center Cooling

Servers don’t just hum. They roast. Without efficient cooling, energy costs skyrocket, equipment fails faster, and uptime becomes a gamble. The stakes are even higher in hot climates, where cooling systems face relentless pressure from the environment. 

Parsons doesn’t just design cooling systems; we engineer confidence. We’ve helped clients in desert environments save hundreds of thousands in energy costs by designing cooling systems that flex with the seasons, the workload, and the growth curve. Whether you’re building new or retrofitting an existing space, we future-proof performance through strategic design: hot aisle/cold aisle containment, prefabricated insulated wall systems, and modular HVAC that scales as your footprint grows. 

That strategy includes smart design choices that improve PUE (Power Usage Effectiveness) while keeping systems flexible enough to evolve with IT load demands. We optimize airflow through hot and cold aisle containment, deploy liquid cooling for high-density floors, and align server utilization strategies with floor-by-floor cooling plans. We have even designed for free cooling, leveraging outdoor temperatures to reduce load on mechanical systems. And where clients are open to it, we explore on-site renewables like solar or wind to lower utility costs and shrink carbon impact. 

2. Supply Chain: The Invisible Saboteur 

Transformers, redundant power panels, and cooling systems aren’t items you can grab off the shelf. They are the backbone of your data center, and they take what seems like forever to order and receive. Long lead times, vendor bottlenecks, and the occasional “sorry, we’re out of stock” email that sends your schedule into a tailspin. 

The last thing you need is this sort of problem. Your construction crew is on-site, ready to install critical equipment. The clock is ticking, the budget is tight, and then…nothing. The transformers you ordered are stuck in transit, delayed by weeks. Every day costs thousands in idle labor, and your carefully planned timeline starts unraveling. It’s not just frustrating; it’s expensive. 

Data Center

When you work with Parsons, we don’t wait for problems to show up—we plan for them before they happen. For one client, we helped implement a proactive material storage system that ensured every piece of equipment was on-site and ready when needed. Think rented land, climate-controlled vans, and a security team keeping watch. Game changer for the client. Let’s do the same for your firm. 

3. Commissioning: Where Projects Fall the Hardest 

Commissioning is the final hurdle before your data center goes live, and it’s where many projects stumble. Missed steps, poor planning, or lack of oversight can lead to costly delays and offline systems. 

We’ve seen it happen: commissioning delays that stretch for weeks because of overlooked details. Imagine discovering critical errors (like reversed PDUs) just days before your go-live date. The result? A two-week delay and frustrated stakeholders. 

Parsons believes in planning commissioning from day one, ensuring every system is tested, validated, and ready to perform. Our process goes beyond checklists. We stress-test systems under real-world conditions to catch issues before they become problems. 

Confidence Built In: Why Parsons Is Your Safety Net 

Parsons doesn’t just help our clients build data centers. We help them build certainty in their projects. Certainty that the cooling systems won’t buckle under the summer heat. Certainty that the supply chain won’t leave your construction crew twiddling their thumbs. And certainty that when Day 1 arrives, the brand-new data center will hum and not hiccup. 

Not every firm can handle the stakes of data center buildouts. But Parsons isn’t just any firm. We’ve spent decades turning high-stakes projects into success stories. Whether you’re starting from scratch or turning an old telecom hub into a modern tech powerhouse, Parsons has the playbook. We’ve led brownfield conversions, office-to-data-center retrofits, and mechanical upfits that extend the life of existing assets without compromising future performance. 

So, here’s the question: Are you ready to stop worrying about what could go wrong and start building smarter? 

Let’s talk. Whether it’s a Cold Eyes Validation to uncover risks early or full-service consulting to guide your project from start to finish, Parsons is the partner you call when failure isn’t an option. 

About The Author

Gretchen Gardener currently serves as Vice President of Business Development in the Energy & Environment sector at Parsons and is passionate about solving complex challenges and connecting industry colleagues and partners. She’s an innovation champion with extensive expertise in project delivery across multiple industries. While focusing on fostering business growth and advancing innovative solutions, she collaborates with teams to align with Parsons’ commitment to addressing complex challenges through strategic partnerships.

The post The High Stakes Of Data Center Buildouts  appeared first on Parsons Corporation.

]]>
Harnessing Digital Twins, AI, And Cyber For Smarter Spaceport Operations /2025/08/harnessing-digital-twins-ai-and-cyber-for-smarter-spaceport-operations/ Mon, 18 Aug 2025 15:03:09 +0000 /?p=31504 Explore the future of spaceports and how digital twins, AI, and cybersecurity enhance their operational success.

The post Harnessing Digital Twins, AI, And Cyber For Smarter Spaceport Operations appeared first on Parsons Corporation.

]]>
Estimated reading time: 5 minutes

As spaceports evolve into sophisticated hubs for space exploration, the integration of emerging technologies such as digital twins, artificial intelligence (AI), and robust cybersecurity measures is becoming essential for operational success. These technologies help spaceports not only optimize their operations but also ensure safety, efficiency, and seamless coordination. They connect various transportation modes, including air, ground, water, and orbit. The synergy between digital twins, AI, and cybersecurity is paving the way for spaceports to operate in a smarter, more effective, and sustainable way.

The Power Of Digital Twins In Spaceport Development

Digital twins—virtual replicas of physical spaces or systems—are revolutionizing the way spaceports are designed, operated, and managed. By modeling spaceport infrastructure, operations, and surrounding systems, digital twins enable spaceport developers to simulate real-world scenarios. They also assess the impacts of different variables before they physically manifest.

For example, digital twins allow spaceport planners to model the entire transportation process, from the arrival of goods and personnel to the transport of rockets and spacecraft to launch pads. These simulations help identify bottlenecks, safety hazards, or areas where improvements can be made. This ensures operations are as smooth and efficient as possible. Furthermore, digital twins allow developers to run simulations of weather, traffic, and emergency scenarios, which are critical for preparing spaceports for every possible situation.

One of the key advantages of digital twins is their ability to support community adoption. Local residents, regulators, and stakeholders often have concerns about the impact of spaceports, from traffic disruptions to environmental effects. Digital twins can visually represent how spaceport operations will unfold. They address these concerns by providing a transparent, data-driven view of how the spaceport will operate in harmony with surrounding infrastructure and communities. Developers can also use these models to showcase how potential disruptions will be minimized, building trust and collaboration with local communities.

AI-Driven Optimization For Spaceports

Artificial intelligence (AI) plays a complementary role in optimizing spaceport operations. Once a digital twin is established, AI algorithms can analyze real-time data to predict traffic patterns. They also optimize launch scheduling and identify potential operational inefficiencies. AI-driven analytics help spaceport operators make smarter, data-backed decisions that enhance efficiency and minimize risks.

For example, AI can predict launch windows by assessing a variety of factors such as weather conditions, air traffic, and available transportation routes. AI can also help automate the scheduling of rockets, personnel, and cargo. This ensures that everything arrives at the spaceport on time and without any logistical delays. When combined with data from IoT sensors, AI allows spaceports to operate in real-time, adjusting operations based on the latest available information.

Additionally, AI can help manage complex transportation systems by predicting demand and optimizing multimodal transport. Whether it’s coordinating airport runway access for horizontal launches or managing the movement of goods via sea and road, AI ensures smooth operations. As spaceports become increasingly integrated with the surrounding infrastructure, AI can ensure that all systems work together smoothly, minimizing disruption and maximizing operational efficiency.

Enhancing Safety And Sustainability

AI and digital twins are not just about optimization—they also play a vital role in enhancing safety and sustainability. Spaceports are increasingly facing pressure to minimize their environmental impact, and these technologies provide the tools necessary to meet those demands.

AI-driven safety features can predict potential hazards before they happen. For example, AI can monitor for abnormal weather conditions or identify any operational risks that might compromise launch safety. It can then alert operators in real-time and recommend mitigation strategies. This proactive approach to safety helps ensure that spaceports can meet the rigorous standards required for safe space operations.

In terms of sustainability, digital twins can simulate the environmental impact of spaceport operations, including noise, emissions, and energy use. By accurately modeling these impacts, developers can identify ways to reduce their carbon footprint. They can also optimize energy use and improve waste management. This focus on sustainability will be crucial as these facilities expand to accommodate the growing demand for space exploration.

Securing Spaceports And The Critical Role Of Cybersecurity

Securing spaceports from cyber threats is critical to maintaining the safety, reliability, and seamless operation of these advanced hubs. Robust cybersecurity measures are vital for safeguarding sensitive infrastructure, operational data, and interconnected systems against potential breaches or attacks.

Preparing For Future Growth

As the space industry expands, spaceports must evolve to handle increasing traffic and complex operations. The integration of AI, digital twins, and advanced cybersecurity is not just a technological leap but a strategic foundation for the future of intelligent, scalable, and resilient spaceports. These technologies optimize performance, protect critical systems, and enable smarter infrastructure management. This drives both innovation and economic growth.

By embracing these advancements, spaceports can scale efficiently. They ensure safety and operational integrity while fostering sustainability in a globally interconnected space economy. Together, these efforts empower the next generation of space exploration, safeguarding operations and contributing to a more secure and prosperous future in space.

Spaceports

Learn More About Spaceports As Smart Hubs

If you’d like to hear from Parsons’ Vice President of Technology & Innovation, Guada Casuso, she will be speaking at the Global Spaceport Alliance webinar, Spaceports as Smart Hubs: Integrating Air, Ground, Water, and Orbit.

Register here to join the conversation.

About The Author

Guada Casuso is a seasoned technology executive with over 20 years of experience driving digital innovation and fostering emerging business opportunities. Known for her strategic vision and deep understanding of technological trends, she has consistently leveraged advanced solutions to accelerate digital transformation and deliver impactful results for organizations. Guada’s expertise spans a wide range of technology domains, including artificial intelligence, digital twins, and simulations. Her leadership has been instrumental in delivering cutting-edge solutions across these areas. Currently, Guada serves as the Vice President of Technology and Innovation at Parsons Intelligent Infrastructure, where she leads Digital Labs and Strategic Partnerships, driving forward-thinking initiatives in the mobility sector. Prior to this role, she held a leadership position at Microsoft, where she spearheaded sustainability and autonomous systems efforts within Microsoft Technology & Research under the Office of CTO.

The post Harnessing Digital Twins, AI, And Cyber For Smarter Spaceport Operations appeared first on Parsons Corporation.

]]>
From Battlefield To Tech Lab: How Parsons Supports Irregular Warfare With TReX® /2025/06/from-battlefield-to-tech-lab-how-parsons-supports-irregular-warfare-with-trex/ Tue, 24 Jun 2025 10:00:00 +0000 /?p=31044 Join Daniel Oh and Scott Asack as they discuss the importance of TReX® and its role in modern electronic warfare solutions on the podcast "Meet The Mission."

The post From Battlefield To Tech Lab: How Parsons Supports Irregular Warfare With TReX® appeared first on Parsons Corporation.

]]>
Meet the mission

Estimated reading time: 3 minutes

Our latest episode of “Meet the Mission” features Daniel Oh and Scott Asack as they demystify TReX®, an innovative solution designed to solve complex challenges related to electronic warfare and Signals Intelligence (SIGINT). They explain TReX’s high-fidelity capabilities, how it’s used for mission planning and warfighter training, and its unique position in the market.

The conversation also delves into Parsons’ role in the industry, the importance of operational experience in developing such tools, and how TReX remains relevant and ahead of the curve in a rapidly evolving threat landscape, including its potential applications for the Space Force. They also share insights into career paths in this exciting field and what makes TReX a game-changer for national defense.

Listen In Now

Episode Overview

  • 0:00 – 4:29: Welcome and Introductions (Meet the Mission Introduction, Speaker Intros)
  • 4:30 – 7:39: Explaining TReX and Tech Influences (How to explain TReX to a 10-year-old, Dinner with a tech expert, introduction to electronic warfare)
  • 7:40 – 16:09: Unforeseen Challenges and Go-To Gadgets (Unexpected live test/training incidents, Favorite gadgets)
  • 16:10 – 21:38: Personal Journeys and Operational Philosophy (Daniel’s career path, TReX in mission sets, Scott’s “Train like you fight” experience)
  • 21:39 – 27:59: Passion for EW & TReX Explained (Excitement for the industry including electronic warfare, High-level overview of TReX)
  • 28:00 – 36:24: TReX’s Unique Fidelity and Realism (What sets TReX apart, Fidelity and realism TReX provides)
  • 36:25 – 47:19: TReX in Action: Mission Planning and Training Impact (How a mission planner uses TReX in electronic warfare scenarios, User feedback, Enhancing warfighter training)
  • 47:20 – 53:49: Customization and the Future of EW with TReX (Customizable training, Future of EW & SIGINT, New TReX capabilities)
  • 53:50 – 1:01:09: Building the Team and TReX’s Future (Relevant skills and backgrounds for the industry, Excitement for TReX’s future)
  • 1:01:10 – 1:02:00: Space Force Applications and Working at Parsons! (TReX for Space Force and its role in electronic warfare, Join our team!)

More About TReX®

TReX® is a signal emulator that uses software and readily available hardware to provide a realistic threat environment for testing and evaluating electronic warfare (EW) systems. It’s an easy-to-use tool that also enables effective training of warfighters with representative signals of interest, helping to experiment, train, and plan next-gen signals intelligence (SIGINT) and EW operations. Learn more about TReX.

Tune In and Join The Conversation

Don’t miss out on this opportunity to explore the future of technology in electronic warfare with us! Subscribe to “Meet The Mission” on YouTube or Spotify and stay tuned for new episodes released monthly.

The post From Battlefield To Tech Lab: How Parsons Supports Irregular Warfare With TReX® appeared first on Parsons Corporation.

]]>
My Top Three Takeaways From SOF Week /2025/05/my-top-three-takeaways-from-sof-week/ Wed, 28 May 2025 14:39:25 +0000 /?p=30940 Explore the highlights of SOF Week 2025 in Tampa, where military leaders discuss the future of special operations.

The post My Top Three Takeaways From SOF Week appeared first on Parsons Corporation.

]]>
SOF Week

Estimated reading time: 4 minutes

SOF Week 2025: A Glimpse into the Future of Special Operations

Recently, I had the privilege of attending SOF Week 2025 in Tampa, Florida. The event brought together the Special Operations Forces (SOF) community, SOCOM, industry partners, and technology innovators, providing a unique platform to discuss the challenges and opportunities shaping the future of special operations. Here are my top three key takeaways from the conference:

1. The Power of Partnerships and Integration

One of the most prominent themes at SOF Week was the emphasis on partnerships and integration. It’s clear that addressing today’s complex global threats requires a collaborative approach, bringing together not only different branches of the military but also international allies and the private sector.

General Dan Caine, the 22nd Chairman of the Joint Chiefs of Staff, provided insights on integration that were particularly impactful. He stressed the importance of combining the efforts of SOF forces, the joint force, interagency partners, allies, and the private sector to achieve what he called “exponential returns on time and capital.” This concept resonates strongly with the need for seamless collaboration across different domains.

This focus on integration also highlights the increasing operational demands on SOF, necessitating rapid deployment and strategic response. To meet these demands, the conference underscored the need for SOF teams to work seamlessly with coalition partners through common technologies and communication protocols.

2. Tech Innovations for the Modern Battlefield

Technology is, as always, a driving force in the evolution of special operations. SOF Week showcased a range of cutting-edge innovations designed to enhance the capabilities of SOF operators.

Several key areas stood out:

  • No/Low-Bandwidth Communications: The development of communication software that can function effectively in environments with limited or no bandwidth is critical for maintaining connectivity in austere and challenging operational settings.
  • Mapping and Situational Awareness: Specialized tools for mapping and situational awareness are crucial for providing SOF teams with the information they need to operate effectively in complex and dynamic environments.
  • Human Performance Optimization: Advancements in this area are aimed at enhancing the physical, mental, and emotional capabilities of SOF operators, ensuring they are ready to meet the demands of modern warfare.
  • Ease of Use and Minimal Training: The emphasis on developing technologies that are easy to use and require minimal training is essential for rapid adaptation by SOF teams in the field.

These innovations, many of which were on display in live capability demonstrations – including our JavelinTM and AresTM biometric technologies, are transforming the way SOF operates, enabling them to be more agile, adaptable, and effective.

3. Embracing Innovation and Adaptation

The historical perspective on special operations innovation, from modifying machine guns on jeeps to using drones for cross-domain operations, reminds us that continuous adaptation and technological advancement are essential for maintaining a strategic advantage.

Final Thoughts

This year’s SOF Week conference provided a valuable glimpse into the future of special operations. The emphasis on partnerships, technological innovation, and continuous adaptation underscores the SOF community’s commitment to maintaining its edge in an increasingly complex and challenging world. The event left me with a sense of optimism and confidence in the ability of SOF forces to meet the challenges of the future.

About The Author

Craig Archer is Senior Director of Strategic Solutions for Engineered Systems. A retired U.S. Army Special Forces and Department of Defense civilian, he boasts extensive expertise in Identity Intelligence, Biometrics, Forensics, Military Operations, and Communications Architectures. Craig has notably led a $2.4 billion lifecycle Intelligence Community program, representing the Department of Defense, Interagency Partners, and Commercial Equities including international and industry officials. He uses his ability to devise and implement enterprise-level strategies to impact real-world solutions that meet ever-evolving international security challenges.

About The Author

Brian Oliver is an account manager at Parsons Corporation, where he oversees programs such as the U.S. Army Next Generation Biometrics Collection Capability (NXGBCC) and the Department of Defense International Military Student (IMS) Vetting Program. He’s held various roles throughout his career, including Program Task Lead and Field Service Representative (FSR) for USSOCOM, showcasing his adeptness in managing high-value contracts and facilitating communication between military and governmental entities. A retired U.S. Army Special Forces Communications and Special Forces Intelligence Sergeant, Brian has a rich history of service through multiple combat deployments. His contributions have advanced unconventional warfare and identity intelligence operations, and his leadership and strategic acumen have enhanced biometrics training and Sensitive Site Exploitation (SSE) methodologies, leaving a lasting impact on service members and national security initiatives.

The post My Top Three Takeaways From SOF Week appeared first on Parsons Corporation.

]]>
The INDOPAC Region: A Strategic Imperative For U.S. Security /2025/04/the-indopac-region-a-strategic-imperative-for-u-s-security/ Tue, 08 Apr 2025 11:00:00 +0000 /?p=30538 The Indo-Pacific (INDOPAC) region is the geopolitical and economic center of gravity in the 21st century. Stretching from the west coast of the United States to the Indian Ocean, this […]

The post The INDOPAC Region: A Strategic Imperative For U.S. Security appeared first on Parsons Corporation.

]]>
INDOPAC

The Indo-Pacific (INDOPAC) region is the geopolitical and economic center of gravity in the 21st century. Stretching from the west coast of the United States to the Indian Ocean, this vast area is home to the world’s most dynamic economies, critical trade routes, and emerging security challenges. As a former Commander of U.S. Naval Air Forces Pacific, I have witnessed firsthand the region’s strategic complexity and the evolving role of our Nation’s joint force along with allies and partners in maintaining the stability of the region for the last 80 years.

The Indo-Pacific is not just a priority—it is the future of global security, and our approach must be deliberate, adaptive, and forward-looking.

The Strategic Importance Of INDOPAC

The Indo-Pacific is home to over half the world’s population and nearly two-thirds of global GDP. It hosts some of the world’s busiest maritime trade routes, with the South China Sea alone accounting for one-third of global shipping. The region is also the epicenter of strategic competition, with China’s rapid military expansion, territorial disputes, and efforts to assert influence through economic and military means reshaping the security landscape.

U.S. interests in the region are clear: freedom of navigation, adherence to international law, strong alliances, and deterrence against destabilizing activities. The U.S. Navy plays a crucial role in this equation, ensuring open sea lanes, conducting joint exercises with allies, and deterring aggression through a persistent forward presence. Companies like Parsons are instrumental in this mission, providing advanced technology solutions to enhance maritime security, cybersecurity resilience, and intelligence capabilities that strengthen our strategic posture in INDOPAC.

Parsons’ Strategic Investment In Hawaii

Recognizing the critical role of the Indo-Pacific in global security, Parsons has expanded its presence to the island of Oahu, a key hub for U.S. military operations in the region. Hawaii’s strategic location makes it an essential forward operating base for U.S. forces, serving as a bridge between the continental United States and the broader Indo-Pacific theater. INDOPAC’s “tyranny of distance” is unique to this region and sets it apart from any other geographic component commander. San Diego to Hawaii is over 2,500 miles. Hawaii to Guam (2nd island chain) is over 3,800 miles, and Guam to Manila (1st island chain) is over 1,600 miles. Successful deterrence is dependent on agile, redundant and resilient supply chains. That logistics “tail” is essential if conflict occurs. Parsons’ presence in Hawaii and strategic partnerships with world-class logistics experts and providers gives us a unique opportunity to solve the most complex logistics problems across the phases of competition.

Given the geopolitical climate, including rising tensions in the South China Sea and the need for enhanced missile defense and cybersecurity infrastructure, Parsons’ investment in Hawaii underscores its commitment to strengthening national defense and supporting military readiness.

By establishing a headquarters on Oahu, Parsons is positioned to better provide cutting-edge technology solutions, real-time intelligence support, and critical infrastructure modernization that will bolster U.S. capabilities in deterring threats and maintaining regional stability in INDOPAC.

Lessons From Experience

Throughout my career, I have worked closely with allies and partners across the Indo-Pacific, from Japan and South Korea to Australia and India. One of the most valuable lessons I have learned is that presence equals influence. Whether through joint training, humanitarian missions, or multinational operations, the strength of U.S. engagement in the region is measured by our ability to build trust and interoperability with partners. INDOPAC plays a crucial role in these efforts.

In my time commanding air and maritime forces in the Pacific, I saw the direct impact of high-end naval capabilities, real-time intelligence, and strategic deterrence in maintaining regional stability. However, maintaining a competitive edge requires constant adaptation—whether integrating unmanned systems, leveraging artificial intelligence, or strengthening cyber resilience. Companies like Parsons are leading the way in these areas, developing AI-driven analytics, autonomous systems integration, and next-generation mission support to help the U.S. maintain its advantage in a rapidly evolving threat environment.

Parsons And INDOPACOM Alignment

INDOPAC
Members of the Parsons team attending Tech-Net IndoPac 2024.

Parsons has emerged as a key player in delivering capabilities in this region. We have coordinated capabilities and actions to deliver outcomes to the Commanders of INDOPAC and each of the components. Our portfolio, from complex project management to space enabled warfare has earned Parsons “a seat at the table.” We’ve proven ourselves as both partner and lead on myriad projects.

This is an exciting time to be with Parsons and to be forward in Oahu. The Indo-Pacific will define the future of global stability, and the United States must remain fully committed to its role as a stabilizing force in INDOPAC. As someone who has spent a career operating in this critical region, I believe that through strength, adaptability, and partnership, Parsons can significantly contribute to ensuring a free and open Indo-Pacific for generations to come.

The challenges are significant, but so are the opportunities. The time to act is now, and with the support of industry leaders like Parsons, we are better positioned than ever to meet the demands of an increasingly complex security environment.

About The Author

Kenny Whitesell, Vice President of INDOPAC Growth & Strategy at Parsons, is a distinguished retired vice admiral of the United States Navy, having served as the Commander of Naval Air Forces and Commander of Naval Air Force, U.S. Pacific Fleet. Over his decades-long career, he played a critical role in shaping naval aviation strategy, readiness, and modernization, particularly in the Indo-Pacific region. A naval aviator by training, he held key leadership positions across multiple commands, including operational deployments aboard aircraft carriers and strategic roles at the Pentagon. His expertise in maritime security, power projection, and joint operations has been instrumental in advancing U.S. strategic interests in an era of increasing geopolitical competition. He continues to contribute to national security discussions, offering insights on naval capabilities, defense innovation, and the evolving challenges of great power competition.

The post The INDOPAC Region: A Strategic Imperative For U.S. Security appeared first on Parsons Corporation.

]]>
Introducing Meet The Mission, A New Video And Podcast Series By Parsons /2025/04/introducing-meet-the-mission-a-new-video-and-podcast-series-by-parsons/ Wed, 02 Apr 2025 20:02:16 +0000 /?p=30395 Join us for 'Meet The Mission' to explore groundbreaking technology and innovation in cybersecurity and defense.

The post Introducing Meet The Mission, A New Video And Podcast Series By Parsons appeared first on Parsons Corporation.

]]>
Meet the mission

“Meet The Mission”: Your Inside Look At Parsons’ Innovation

We are thrilled to announce our new video and podcast series called, “Meet The Mission,” a deep dive into the cutting-edge technology and groundbreaking innovation driving Parsons forward. This dynamic new platform provides listeners with exclusive access to Parsons’ experts, exploring the latest projects, industry trends, and the future of critical technologies.

The inaugural episode, “Future Tech: What to Expect in Cybersecurity & Defense in 2025,” sets the stage for the series mission: to bring listeners to the forefront of innovation. In this episode, industry leaders Ryan Gabriele and Jenn Bergstrom tackle pivotal questions surrounding the evolving landscape of cybersecurity and defense, offering invaluable insights into the technologies shaping our future.

What You’ll Discover In This Episode

Episode Breakdown

  • Personal Tech & AI (4:39 – 12:19): Get a glimpse into the personal tech habits of our experts and their perspectives on AI assistance tools like ChatGPT, Siri, and Alexa.
  • Cybersecurity & Defense Trends (12:19): Explore the major trends poised to redefine cybersecurity and defense strategies in the coming year.
  • Project Linchpin (16:20): Ryan breaks down Parsons’ role in the Army’s Project Linchpin, offering a behind-the-scenes look at its impact.
  • Innovations in Cyber Threat Defense (21:50): Discover the most promising innovations that could revolutionize how we combat cyber threats.
  • Cloud Infrastructure & AI (26:45): Understand the crucial role cloud infrastructure plays in accelerating AI adoption within the defense sector.
  • AI Cyber Defense Resilience (30:30): Learn how Parsons is ensuring its AI-powered cyber defenses remain robust against sophisticated adversaries.
  • Gamification & AI in the Cloud (35:10): Gain insights from gamification experiences and events focused on AI and cloud technologies.
  • Multi-Cloud & Cloud Adoption Barriers (39:20 – 41:39): Dive into the complexities of multi-cloud environments and the challenges of cloud adoption in the defense industry.
  • Zero-Trust Architectures (45:22): Explore the impact of zero-trust architectures on cybersecurity strategies.
  • Future-Proofing National Security Tech (48:05): Discuss the challenges and strategies for future-proofing national security technologies.
  • Cybersecurity Threats (52:40): Gain expert perspectives on the biggest cybersecurity threats facing US defense systems in the next 3-5 years.
  • The Exciting Future (54:50): Hear what excites our experts most about the future of cybersecurity, AI, machine learning, and defense technology.

About Our Host

Candice Scarborough is the host of “Meet The Mission” and Director of Cyber Security and Software Engineering at Parsons, experienced with full-stack and object-oriented web applications, databases, service architectures, cloud infrastructure, security, risk analysis/mitigation. Her background in Software Engineering and Project/Software Development provides unique insight into technical requirements while still providing practical solutions to those needs that come up when the need arises.

About Our Guests

Ryan Gabriele is Senior Vice President and Chief Technology Officer for Defense & Intelligence at Parsons, founded and manages the SPARC organization, spearheading technical solutioning and productization for the Defense and Intelligence market. With 20+ years of DOD experience, he supports business development, leads customer engagements, and communicates Parsons’ value to strategic partners. You can learn more about him here.

Jenn Bergstrom serves as Vice President of Cloud and Data Solutions within the Defense & Intelligence sector at Parsons and is also a Parsons Fellow. A leader driven by a passion for empowering teams, Jenn fosters excellence by focusing on targeted technologies and a “leading by lifting” approach. She is known for strong tactical and strategic thinking. You can learn more about her here.

Tune In and Join The Conversation

Don’t miss out on this opportunity to explore the future of technology with us! Subscribe to “Meet The Mission” on YouTube or Spotify and stay tuned for new episodes released monthly.

The post Introducing Meet The Mission, A New Video And Podcast Series By Parsons appeared first on Parsons Corporation.

]]>
Behind The Scenes Of The Water Sector’s Cybersecurity Crisis—And What You Need To Know  /2024/10/behind-the-scenes-of-the-water-sectors-cybersecurity-crisis-and-what-you-need-to-know/ Tue, 29 Oct 2024 20:16:08 +0000 /?p=29449 Cybersecurity threats facing the water sector aren’t some far-off concern—they’re here, they’re persistent, and they’re only getting smarter. Domain name system (DNS) vulnerabilities, phishing attempts, lateral movement inside your network—these […]

The post Behind The Scenes Of The Water Sector’s Cybersecurity Crisis—And What You Need To Know  appeared first on Parsons Corporation.

]]>

Cybersecurity threats facing the water sector aren’t some far-off concern—they’re here, they’re persistent, and they’re only getting smarter. Domain name system (DNS) vulnerabilities, phishing attempts, lateral movement inside your network—these aren’t just buzzwords; they’re the daily reality that the water sector can no longer afford to ignore. Ransomware, for example, can bring operations to a screeching halt. But the more sophisticated attacks? Those are the ones that keep people up at night. 

In this blog, we’re going to dig into the trends and incidents that are happening at our client water utilities across the country. We’re here to shine a light on what’s going on behind the scenes and why every utility—no matter the size—needs to take cybersecurity seriously before it’s too late. 

Key Cybersecurity Concerns Found By Cyberzcape™ 

Our Security Operations Center (SOC) has had a front-row seat to the evolving threats facing water utilities across the country. While every system is different, we’ve identified several key vulnerabilities and recurring issues that have popped up time and time again in the water sector over the last few months. Spoiler: the hackers aren’t playing around. 

OpenDNS DNSCrypt Communications

One of the more common—and concerning—findings is not inherently malicious but can be used by attackers to obfuscate DNS traffic and bypass detection mechanisms. In one instance, our SOC team detected suspicious OpenDNS DNSCrypt communications at a water utility. DNS, often referred to as the “phonebook of the internet,” is a crucial part of how all systems communicate. When attackers manipulate or hijack DNS, they can intercept or redirect network traffic, putting the integrity of the entire system at risk. It’s like someone secretly rerouting your mail to an entirely different address—only, in this case, the stakes involve essential water services.

Lateral Movement Is The New Break-In Playbook 

Another red flag we’ve seen involves WinRM/WMI traffic, which can signal not only lateral movement but also enable remote code execution, data exfiltration, and system compromise. This is the digital equivalent of a burglar creeping from room to room, looking for anything valuable. If not detected early, lateral movement allows attackers to dig deeper into the network, gaining access to critical systems and data. Beyond just network exploration, the use of WinRM/WMI can lead to executing commands that control the entire system and extract sensitive data. At one client site, we saw signs of this very behavior, suggesting that attackers could have been probing for weaknesses to exploit. In the water sector, such weaknesses could lead to major disruptions, from altered chemical levels to halted operations. 

Passwords In Plain Sight, Yet Again… 

Let’s not forget about cleartext credentials—those old-school, unencrypted usernames and passwords floating around on the network like it’s 1995. Exposed credentials remain a significant vulnerability that requires immediate attention to avoid unauthorized access. Our team recently flagged this issue at another utility, where cleartext credentials were detected in the network traffic. Leaving credentials exposed is like handing an intruder your house keys, and yet, it’s still something we encounter in environments that should know better, and we encounter it A LOT. 

Convenience With Risks Using Remote Access 

Remote access is another common weak point. We’ve identified Citrix/GoToMyPC activity at a number of facilities. While remote desktop software can be convenient, it’s also a glaring vulnerability if not properly secured. In critical infrastructure environments like water utilities, access through remote tools can lead to operational control by malicious actors. This type of vulnerability came to light in 2021 with the Oldsmar, Florida incident, where a hacker used TeamViewer to try and poison the water supply. If attackers gain access, they could control everything from water flow to chemical treatments, making it a critical area for vigilance. 

Phishing For Trouble 

While network vulnerabilities can bring attackers inside, we’re also seeing more traditional attack vectors like phishing continue to evolve. Cyberzcape™, our real-time threat detection and response platform, is seeing more instances of phishing attempts and malicious DNS queries, targeting everything from email accounts to network servers. It’s not just the IT systems at risk; the operational technology (OT) networks—the ones that control the actual water treatment processes—are also being probed. As the lines between IT and OT blur, these threats make it more challenging to defend infrastructure comprehensively. This means utilities need stronger, integrated defenses that span both environments. 

Preparing For What’s Next In Water 

The cybersecurity threats we’ve outlined—whether DNS vulnerabilities, lateral movement, or phishing—are just the beginning. The truth is, the water sector can’t afford to wait. As these threats evolve and become more sophisticated, utilities of all sizes need to strengthen their defenses. Ignoring the risks will only lead to more incidents, greater disruptions, and potentially devastating consequences. 

But here’s the good news: we are here to help. We’re not just flagging vulnerabilities—we’re giving water utilities the tools they need to proactively protect their systems. Cyberzcape™ monitors, detects, and stops threats in real-time to keep water facilities secure 24/7, ensuring you’re never caught off guard. And for those looking to stay ahead of the curve, our Cybersecurity Playbook for the Water Sector offers a comprehensive guide to building stronger, more resilient defenses—step by step. 

The risks are here, but so are the solutions. Take action now, secure your infrastructure, and ensure the safety and reliability of your water systems for years to come. At Parsons, we’re not just your partner in cybersecurity—we’re your partner in safeguarding the future. 

For our free eBook “The Ultimate Water Sector Cybersecurity Playbook: 33 Essential Steps to Safeguard Your Operations” click here!

About The Author

As the Senior Growth Operations Manager at Parsons, John Daly specializes in utility cybersecurity and energy management solutions. John is passionate about electrification and sustainability, contributing to Parsons’ efforts in developing innovative Distributed Energy Resource Management Systems and Meter and Operational Data Management programs. His work with a range of utilities, from resource-strapped rural providers to large power utilities, demonstrates his commitment to advancing energy management solutions and grid resiliency. John is an active member of various emerging technology communities, including Augmented Reality security and safety policy with the OpenARCloud, Virtual Reality design best practices with V.E.I.L. and the University of Sydney, and the Parsons AI Center of Excellence team for Artificial Intelligence literacy, safety, and acceptable use at Parsons.

The post Behind The Scenes Of The Water Sector’s Cybersecurity Crisis—And What You Need To Know  appeared first on Parsons Corporation.

]]>