VSE Corp. [VSEC]: URS Corp. [URS]: Booz Allen Hamilton [BAH]: Firms Awarded BPA for Cyber Security Services by GSA and DHS

August 2011
TR2: Terror Response Technology Report;8/31/2011, Vol. 7 Issue 18, p10
Trade Publication
This article reports on a contract received by VSE Corp. for a Blanket Purchase Agreement (BPA) for cyber security services from the U.S. General Services Administration and the Department of Homeland Security.


Related Articles

  • GSA to keep vigilant with patch-notification service. Messmer, Ellen // Network World;12/2/2002, Vol. 19 Issue 48, p12 

    Reports that the U.S. General Services Administration (GSA) has launched its software security patch notification service for federal civilian agencies. Features of the program managed by the Federal Computer Incident Response Center of the GSA; Highlights of the service based on the InSite...

  • Security for Third Party Hosted Public Websites: Why It's Important to Sheriffs and What to do About It. Lange, Chuck; Colwell, Lee // Sheriff;Nov/Dec2011, Vol. 63 Issue 7, p44 

    The article discusses on the importance of website security to sheriffs' hosted public websites. It mentions that hacked public websites of sheriffs can provide unnecessary publicity to the sheriff, and may expose legal liability. It also mentions the significance of asking information...

  • Another spin-off for Black Box. Retzlaff, Heather // Catalog Age;Mar2005, Vol. 22 Issue 3, p9 

    Reports on the move of Black Box Corp. to launch a commercial catalog for wireless networking products and installation services in the U.S. in March 2005. Efforts of the company to offer a catalog of computer security products in October 2004; Decline in the company's revenue following an...

  • Sunny Outlook. Sternstein, Aliya // Government Executive;Mar2012, Vol. 44 Issue 3, p28 

    The article discusses the federal government's investment on a high-speed security certification program for obtaining cloud services. It is mentioned that the Federal Risk and Authorization Management Program (FedRAMP), is aiming for acquiring agencies by the time-intensive security...

  • Data Protection. Philpott, Don // Homeland Defense Journal;Sep2007, Vol. 5 Issue 9, p40 

    The article reports on the move of some government agencies in addressing the data protection problem in the U.S. It is said that the Office of Management and Budget, Department of Defense and General Services Administration are working together to award 10 contracts for data protection....

  • Higher Security Baseline, Continuous Monitoring Next Priorities For Fed Cloud Program. Gormisky, Liz // Defense Daily;7/10/2014, p10 

    The article reveals the priorities of the Federal Risk and Authorization Management Program (FedRAMP) for the next two years according to Maria Roat from the U.S. General Services Administration. It mentions the expansion of the cloud program to agencies with high security impact levels, the...

  • The risky business of backups. Oltsik, Jon // Storage Magazine;Apr2005, Vol. 4 Issue 2, p62 

    This paper deals with the overall poor state of storage security in companies. Thirty percent of respondents to a 2004 Enterprise Strategy Group survey reported that their corporate information security policies do not encompass storage technologies. Furthermore, 37 percent of users did not...

  • Notices: GENERAL SERVICES ADMINISTRATION.  // Federal Register;5/13/2013, Vol. 78 Issue 92, p27966 

    The article presents a request for information on improving cybersecurity and resilience through acquisition, from the Office of Emergency Response and Recovery and U.S. General Services Administration (GSA). The GSA is seeking recommendations on feasibility, security benefits, and relative...

  • GSA will spend $247 million on services.  // Architectural Record;Feb1991, Vol. 179 Issue 2, p27 

    Announces that the General Services Administration (GSA) will spend $2.25 billion on sites and construction in fiscal year 1991, while funding for architectural commissions will rise to $247.7 million.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics