Three Steps for Accelerating the ATO Process

This article originally appeared on the Checkmarx blog. Click HERE to read the original in its entirety. An ATO or Authority to Operate is an authorization process that a software system needs to have before the agency can use it…

PODCAST: AST, DevSecOps and Developer Training – Three Essential AppSec Tools

Massive cyberattacks and breaches that originated in applications, including the recent SolarWinds breach that impacted as many as ten government agencies, and the more recent Kaseya breach which may have impacted hundreds of companies, have rightfully raised questions about application…

Combating State and Local Cyberthreats with a Centralized Approach to AppSe

This article was originally featured on the Checkmarx blog. Click HERE to read the original in its entirety. Within state and local governments across the US, citizens using online services can pay taxes and fees, register for libraries, register to…

Five Reasons Why Agencies are Choosing SAST Over WAF

This article was originally featured on the Checkmarx blog. Click HERE to read the original in its entirety. Today’s Application Security (AppSec) measures focus on protecting web applications. These measures include methods of preventing data or code within the application…

Recent News

What to Look for in a Security Scanning Solution

Pointing out problems is not necessarily a bad thing. But simply pointing out problems without…

AI and You – How AI Can Benefit From DevSecOps

If you are a connoisseur of trade shows and new product innovations like me, then…

Six Ways AST Keeps Digital Citizen Services Secure

When in-person processes became impossible during the pandemic, the extent to which public sector services…

Three Steps for Accelerating the ATO Process

This article originally appeared on the Checkmarx blog. Click HERE to read the original in…

PODCAST: AST, DevSecOps and Developer Training – Three Essential AppSec Tools

Massive cyberattacks and breaches that originated in applications, including the recent SolarWinds breach that impacted…

Combating State and Local Cyberthreats with a Centralized Approach to AppSe

This article was originally featured on the Checkmarx blog. Click HERE to read the original…

Five Reasons Why Agencies are Choosing SAST Over WAF

This article was originally featured on the Checkmarx blog. Click HERE to read the original…

Five Factors to Look for in an Application Security Solution

This article was originally published on the Checkmarx blog. To read the original in its…

Four Best Practices for Secure App Development in AWS

This article was originally featured on the Checkmarx blog. Click HERE to read the original…

Developer Spotlight – Kessel Run Makes Air Force History

Last month, the Air Force Life Cycle Management Center (AFLCMC)’s Detachment 12, which is better…

Colleges and Universities – the Next Big Target for Ransomware Attacks

The past few months have been witness to two massive ransomware attacks that have impacted…

Newsletter

Enter your email address below to receive all the latest content to your inbox.

Please view our privacy policy and terms of use for more information on how we protect and manage your personal data.

Upcoming Events
  1. Shifting Security Left with DevSecOps

    August 26 @ 1:30 pm - 2:30 pm
  2. The Children’s Inn at NIH Golf INNvitational

    September 27 @ 11:00 am - 5:00 pm
  3. National Cyber Summit

    September 28 - September 30
Sponsored By
Powered by

 

 

 

We launched GovDevSecOpsHub to focus on the next evolution of application development, DevSecOps, which brings cybersecurity teams and tools into the development process sooner so that applications are more secure and safeguarded against cyber threats.

In  GovDevSecOpsHub we’ll look at the evolution from traditional software and application development to the DevOps model. We’ll talk about the importance of moving from DevOps to DevSecOps. We’ll highlight the technologies and cultural changes necessary to make this shift happen. And we’ll profile government organizations and executives that are the “boots on the ground” as the government pivots towards the DevSecOps model.