GovDevSecOpsHub Editors
66 Articles0 Comments

Open Source Without the Risk – How the Government Can Secure the Software Supply Chain

Earlier this month Checkmarx participated in a Webinar featuring cybersecurity leaders from across the federal government and its private sector partners to discuss one of the largest cyber challenges facing agencies today – software vulnerabilities in the open source solutions…

eBook: Streamlining Government Procurement with a Modern Acquisition Management Solution

Government organizations that rely on outdated, siloed technology to manage their procurement processes face numerous challenges imposed by disjointed applications. Using an acquisition solution that lacks integration with existing legacy solutions opens organizations to these preventable risks: The pre-built automation…

How CISA and NIST are Helping Agencies Develop Secure Software

As modernization continues to sweep across the entire federal government, all agencies are experiencing an influx of new data and information that are becoming juicy targets for hackers to get their hands on. This is unfortunate timing, as cyber attackers…

Innovation Unleashed—How Government Agencies can Benefit From the Cloud

There are many benefits to moving government workloads, applications, and data from legacy hardware and physical data centers into the cloud. Provisioning new cloud services is faster and easier than acquiring and setting up physical hardware, making the cloud inherently…

The AppSec Threats Facing Government Agencies

For IT professionals who develop the technologies, applications, and services that federal, state, and local government agencies employ, there is one specific challenge that they always find themselves brushing up against. When government agencies request new applications and expect them…

How Application Performance Optimization Advances Agency Goals

When COVID-19 reached American shores, federal government agencies were forced to quickly redefine their operating environments by adopting new, modernized processes and applications that would enable them to adjust to the new normal spurred by the pandemic. As the dust…

How federal and SLED agencies are bolstering their cybersecurity postures with DevSecOps

As the federal government and SLED organizations continue to digitally transform their systems, networks, and applications, it is critical that they remain vigilant and be aware of the fact that modernization will always be accompanied by potential network vulnerabilities and…

How UTSA Transformed its Student Service Infrastructure

The University of Texas at San Antonio (UTSA) is a critical gateway to higher education and career success for young people across the state of Texas. For Kendra Ketchum, UTSA Vice President for Information Management and Technology, helping students advance…

Four Benefits of Application Performance Optimization

As the waves of digital transformation continue to spread across and reach all corners of the federal government, agencies are hard at work modernizing their systems, networks, and applications, as well as their critical constituent-facing solutions and services. And as…

An introduction to automation mesh

This article is part of a larger piece that was originally featured on the Red Hat blog. To read the original in its entirety, click HERE. Just like edge computing requires bringing various compute resources closer to the endpoints, automation…

 

 

 

We launched GovDevSecOpsHub to focus on the next evolution of application development, DevSecOps, which brings cybersecurity teams and tools into the development process sooner so that applications are more secure and safeguarded against cyber threats.

In  GovDevSecOpsHub we’ll look at the evolution from traditional software and application development to the DevOps model. We’ll talk about the importance of moving from DevOps to DevSecOps. We’ll highlight the technologies and cultural changes necessary to make this shift happen. And we’ll profile government organizations and executives that are the “boots on the ground” as the government pivots towards the DevSecOps model.