GovDevSecOpsHub Editors
62 Articles0 Comments

The AppSec Threats Facing Government Agencies

For IT professionals who develop the technologies, applications, and services that federal, state, and local government agencies employ, there is one specific challenge that they always find themselves brushing up against. When government agencies request new applications and expect them…

How Application Performance Optimization Advances Agency Goals

When COVID-19 reached American shores, federal government agencies were forced to quickly redefine their operating environments by adopting new, modernized processes and applications that would enable them to adjust to the new normal spurred by the pandemic. As the dust…

How federal and SLED agencies are bolstering their cybersecurity postures with DevSecOps

As the federal government and SLED organizations continue to digitally transform their systems, networks, and applications, it is critical that they remain vigilant and be aware of the fact that modernization will always be accompanied by potential network vulnerabilities and…

How UTSA Transformed its Student Service Infrastructure

The University of Texas at San Antonio (UTSA) is a critical gateway to higher education and career success for young people across the state of Texas. For Kendra Ketchum, UTSA Vice President for Information Management and Technology, helping students advance…

Four Benefits of Application Performance Optimization

As the waves of digital transformation continue to spread across and reach all corners of the federal government, agencies are hard at work modernizing their systems, networks, and applications, as well as their critical constituent-facing solutions and services. And as…

An introduction to automation mesh

This article is part of a larger piece that was originally featured on the Red Hat blog. To read the original in its entirety, click HERE. Just like edge computing requires bringing various compute resources closer to the endpoints, automation…

Gartner Study Finds Adoption of Containerized Databases Increasing

This article was originally published on the Red Hat Blog. Click HERE to read the original article in its entirety. Databases have been traditionally viewed as the definition of a monolith — never intended to be broken down into microservices…

3 Challenges of Using Kubernetes at the Edge for Government IoT Programs

This article was originally authored by Alex Hisaka for the D2iQ blog. To read the original in its entirety, click HERE. The federal government and military are increasingly implementing Internet of Things (IoT) programs to help increase their reach and…

Survey Shows IT Leaders Think Open Source as Secure as Proprietary Software

Each year, Red Hat surveys IT decision-makers about the state of enterprise open source. And the company surprisingly encounters one or two results that it didn’t expect in the survey results, despite its thousands of interactions with IT professionals throughout…

King County Uses Azure to Help Secure Resident Health Data

King County is Washington State’s most populous county, with more than 2.2 million residents. For the Department of Community and Human Services, ensuring that these residents have access to critical social and health services is top of mind. Hampered by…

 

 

 

We launched GovDevSecOpsHub to focus on the next evolution of application development, DevSecOps, which brings cybersecurity teams and tools into the development process sooner so that applications are more secure and safeguarded against cyber threats.

In  GovDevSecOpsHub we’ll look at the evolution from traditional software and application development to the DevOps model. We’ll talk about the importance of moving from DevOps to DevSecOps. We’ll highlight the technologies and cultural changes necessary to make this shift happen. And we’ll profile government organizations and executives that are the “boots on the ground” as the government pivots towards the DevSecOps model.