Latest News Mentioning Carahsoft

Advanced Search
Showing 1-10 of 557

Brian Meyer, federal field chief technology officer at Axonius Federal, said cybersecurity asset management could help government agencies make dozens of security tools work together and strengthen the enforcement of security policies. Cybersecurity asset management “acts as the connective tissue by aggregating data from all the tools, normali...

David Lee, field chief technology officer at Saviynt, said adopting a cloud-based, artificial intelligence-powered identity security platform could help government agencies mitigate risks by unifying a wide range of activities and tools in a single place. What Is Identity Governance & Administration? In an article published on Carahsoft.com, Lee...

Justin Scott, senior director of DevOps and security at Vasion, said government agencies seeking to prevent data breaches and reduce vulnerabilities should prioritize strengthening the security of their printers and print servers. Why Are Printers & Print Servers High-Value Targets for Hackers? In an article published on Carahsoft.com, Scott emp...

Clinton Herget, field chief technology officer at Snyk, said the growing adoption of artificial intelligence-driven software development is highlighting the need for government agencies to integrate security directly into developers’ critical path or environment. What Is Developer Security? In an article published on Carahsoft.com, Herget desc...

Bri Frost, director of security and IT ops curriculum at Pluralsight, said government agencies can strengthen their cybersecurity posture by prioritizing continuous, targeted training and upskilling their IT teams. In an article Carahsoft published, Frost wrote that agencies face mounting challenges in assembling IT teams that can handle today’...

Cyberbit has acquired RangeForce to form a combined company focused on delivering artificial intelligence-powered operational cyber readiness platforms and related capabilities to government and commercial customers worldwide. Combining Cyber Range Capabilities Cyberbit said Tuesday the transaction combines its attack simulation cyber ranges and exp...

Eric Chien, a fellow on the Threat Hunter Team at Broadcom, said government agencies looking to counter attackers should create networks that are secure by default and use tools that leverage artificial intelligence and machine learning. Chien noted that achieving a network that is secure by default means reducing the attack surface and adopting zer...

Chris Newman, Cloud Secure Web Gateway product manager at Broadcom, said adopting a secure web gateway, also known as a proxy, could help organizations improve access management and visibility into fragmented networks. Newman described a proxy as a point of control that serves as an intermediary and determines whether to permit or block access or...

Prateek Temkar, head of product management for Symantec’s information and network security business at Broadcom, said government agencies looking to protect data at rest and in transit should advance encryption, policy enforcement and continuous monitoring. In an article published on Carahsoft.com, Temkar wrote that one of the measures agencie...

Justin Falck, head of product for endpoint security at Broadcom, said government agencies can become more proactive in detecting, preventing and responding to security risks and breaches by having real-time visibility into data and endpoints across their network. “That visibility is a crucial first step in the shift to threat-informed prioriti...