SolarWind's Craig McDonald talks understanding the "What" and "How" in systems monitoring on the Carahsoft Community Blog.Read Article »
Systecon's VP of Strategic Development, Patrick Long talks the importance of digital transformation for Fleet Managers on the Carahsoft Community Blog.Read Article »
October 24th, 2014
With daily news reports of data and account hacks, it is safe to say that the “bad guys” will find a way into places they should not be. Just because we have an alarm on our house does not mean a cunning burglar can’t circumvent it or a brazen thief will not run in while the alarms ring. The same thing goes for our IT and information security.
October 21st, 2014
In March 2012 the government launched the Big Data Initiative and invested over $250 million in Big Data throughout its federal agencies.
October 13th, 2014
Federal Computer Week recently provided a news brief on two key security challenges – Insider Threat and Data Localization. FBI and Department of Homeland Security research showed that businesses incur significant costs ranging from $5,000 to $3 million because of cyber incidents involving disgruntled or former employees. On the point of data localization – the practice of requiring companies to have data centers in their home jurisdictions – a Google executive has spoken out on the inefficiencies and far reaching network design impact such policies would have on organizations.
October 10th, 2014
Cybersecurity is one of the biggest issues facing our government today. View the infographic below for tips on how Government enables Open Source security.
October 9th, 2014
Cybersecurity is a daily discussion in the media and in organizations across the country. How do we keep our data and systems safe in an era of increasingly sophisticated cyber hacks? While this is a critical discussion to have, it is also important to pay attention to the impact of the traditionally less sophisticated practice of social engineering.
October 7th, 2014
This summer, Carahsoft hosted their 4th annual Citizen Engagement seminar. The purpose of this event is to help government organizations understand how to best use technology to interact with their constituents and create an open dialog for solving problems and moving communities forward.
October 3rd, 2014
Recent events reminded government & industry of the real & dangerous consequences of insider threats. A cleared, trusted individual inside a government agency was able to gain access to highly sensitive and privileged information with severely damaging results.
October 1st, 2014
For many states, IT consolidation has been one way to achieve economies of scale that allow valued IT services to continue despite decreased budgets, hiring freezes, and limitations on purchasing. In Pennsylvania, state leaders were well positioned to achieve these types of cost benefits, as the commonwealth has been pioneering consolidation for years.