Vice President, Carahsoft
Learn more about Terry & Carahsoft by checking out his social profiles.
July 29th, 2016
It’s no secret that security incidents involving federal systems have been on the rise over the past few years, but the actual numbers are staggering. Between September 2014 and June 2015, there were 30 million attacks – that’s 1,000 attacks each day.
July 13th, 2016
The Federal Information Technology Acquisition Reform Act (FITARA) requires agencies to ensure that their CIO and other management officials take a more active role in the decision making for information technology acquisitions. While this may sound straightforward, legacy contracting processes and technology solutions are making compliance difficult.
June 7th, 2016
Adding to this paradox, agencies are rapidly migrating to the cloud to become more flexible and reliable while cutting capital costs. With data stored in hybrid and private cloud environments, security is again transforming. In light of these changes, it can become a real temptation to take “trust no one” at its face value and lock down all content.
March 3rd, 2016
The 2016 Mobile World Congress revealed some powerful insights on what matters in mobile security. The focus of this year’s show was not the devices, but the network they run on.
January 19th, 2016
Organizations are shifting their focus from talking about the technology – the technical bits and bytes – to focusing on the business outcome. Agencies are first defining tasks and then deciding on a technology solution, rather than being forced to work with existing legacy solutions that force a “make it work” attitude to real business challenges.
November 5th, 2015
What are we to do when the bad guys use our own technology against us? This is what’s happening everyday as bad actors use the data routes we use - email, applications, data traffic, and more - to get into our systems.
August 31st, 2015
We recently attended the F5 Agility Conference, an event that brings together F5 partners and customers to talk about how they are protecting and deploying business critical applications. One of the more interesting themes that emerged at the conference was the focus on encryption.
January 26th, 2015
F5 recently released a comprehensive look at the state of application delivery. This unique research dives into which of the many application (layer 4-7) services organizations are deploying now and considering deploying in the near future.
December 8th, 2014
The team at F5 recently talked a bit about the reality of the hybrid data center. Robert Haynes, Marketing Solutions Architect and Peter Silva, Senior Technology Marketing Manger held a quick video discussion to break down what it really means to be hybrid.