Latest News Mentioning Carahsoft

Advanced Search
Showing 1-10 of 558

Eleven companies have secured blanket purchase agreements from the General Services Administration and the National Geospatial-Intelligence Agency to provide Earth-observation products, data and services to government customers. Both agencies awarded the BPAs under the IT Schedule 70 acquisition vehicle and in support of the Commercial Initiati...

TYSONS, Va., Jan. 15, 2019 /PRNewswire/ — Executive Mosaic, the leading executive media and events company in the government contracting market, today announced the recipients of the 2019 Wash100 awards.  The Wash100 recognizes the most influential and impactful executives of consequence at the intersection of government and industry. This...

Rob Roy, public sector chief technology officer at Micro Focus Government Solutions, has said information technology modernization offers agencies an opportunity to make incremental changes to address cybersecurity risks. Roy wrote that agencies should consider alternatives to an all-or-nothing type of encryption, which could provide hackers a ...

Dennis Reilly, vice president of federal sales at Gigamon, has said government agencies should have the right balance of technology, people and processes to defend and protect their information technology systems from cyber threats. Reilly wrote that one of the difficult challenges facing agencies is recruiting and retaining cybersecurity profe...

Niels Jensen, senior vice president of Americas sales at ForeScout Technologies (Nasdaq: FSCT), has said federal agencies should have visibility of their internet-of-things-based devices in order to protect their network infrastructure from cyber threats. He wrote that information technology administrators at agencies should deploy tools designed to...

Tom Topping, senior director of strategic programs at FireEye (Nasdaq: FEYE), has said agencies should leverage cyber threat intelligence to manage risks and protect information technology systems from adversaries. Topping wrote that security teams can determine potential attackers as well as their tactics, techniques and procedures used to compromi...