You are here

Featured Articles
Move insight carousel to the left
Move insight carousel to the right
All Articles
Frame Delivers Agency Applications to Any Device, Anywhere and at Any Time

Today’s average employee views work as something they do—not someplace to go. They work when and from where they’re personally most productive. Frame delivers cloud-based virtual workspaces, making it easy to run Windows applications from any device, at any time.

Thinking Next, Now Podcast: Identifying and Mitigating Cyber Risk

There are few organizations that face more sophisticated and diverse security threats as the federal government and United States military. In this fourth podcast in our series, we talk with Jonathan Sholtis, a Senior Program Manager in CSRA’s Defense Group, to discuss mitigate risk and the role that training can play in that process.

Me4Sure, Providing Identity Assurance to Protect Critical Data and Systems

Me4Sure, Inc will be at our next Emerging Tech Day. Me4Sure delivers security and enterprise solutions focusing on authentication and access control, laptop and desktop security, data storage, and SSO. With M4S’ unique multifactor authentication architecture and strong encryption, enterprises can be assured that only authorized users gain access to protected applications, sensitive and/or regulated data.

Peritus Delivers Bullet-proof Data Centers to Resource Strapped Agencies

Today’s federal government agencies and organizations are being forced to do more with less. Peritus’ solutions open the door to significant benefits to the federal government, and they’ll be featured at CSRA's upcoming Emerging Tech Day.
 

Veriflow: Advanced Algorithms, Predictive Models Assure Network Protection

Come meet Veriflow at our next Emerging Tech Day and learn about their Continuous Network Verification platform, which assures network correctness using advanced algorithms and a predictive model of network behavior to prevent network outages and vulnerabilities before they occur. 

Thinking Next, Now Podcast: Defining and Exploring Cyber Operations

In our third Thinking Next, Now podcast for National Cyber Security Awareness Month, we sat down with Donald Robinson, the Chief Technology Officer for Defense at CSRA, to discuss and define cyber operations.

CSRA Experts and Fed IT leaders Talk Next-gen IT in FedScoop's Next-Gen IT Heroes Series

Check out these interviews with CSRA experts and federal IT leaders who share their insights on next-generation IT topics affecting federal agencies, including cyber, cloud, high-performance computing, and more.

Pondera, Combating Fraud, Waste, and Abuse in Government Programs

Pondera is one of the companies CSRA will feature at our upcoming Emerging Technology Day. In this article, we hear from Pondera CEO Jon Coss who outlines some of the challenges facing federal agencies today as they battle fraud, waste, and abuse.

National Cybersecurity Awareness Month

We reached out to CSRA's cyber experts for discussions on various cybersecurity topics, such as cyber defense, cyber resiliency, the cyber executive order, and more.

Thinking Next, Now Podcast: Key Steps to Building a Cyber Resilient Organization

This week, we caught up with Ron Nixon, Chief Technology Officer for Army IT at CSRA, who explores another important aspect of cybersecurity—cyber resilience.

Cybersecurity Discussion: Protect, Detect and Respond

In this three-part broadcast, panelists—including CSRA Cyber Director Dr. Matthew McFadden—discuss the cyber challenges federal agencies face when they have a mix of on-premise and commercial cloud infrastructures. Listen as they discuss approaches agencies might consider to address these issues.

National Cyber Security Awareness Month:  Springboard to Innovation and Collaboration

The Department of Homeland Security launched National Cyber Security Awareness Month 13 years ago to engage, educate, and promote national vigilance around this vital issue. We’ve made some important headway in distinct areas since that time, such as defending against denial-of-service attacks.

Pages

Subscribe to our blog