Digital Transformation, Data Privacy, and Work from Home Reinforce Need for Reliable Document Management

The U.S. government had a paper problem for decades. Many forms are necessary to acquire…

Survey Shows IT Leaders Think Open Source as Secure as Proprietary Software

Each year, Red Hat surveys IT decision-makers about the state of enterprise open source. And…

Can DevSecOps and Separation of Duties Coexist?

The cybersecurity concept of Separation of Duties (SoD) involves dividing up responsibilities and permissions so that…

Four AppSec Threats Facing Healthcare Organizations

The industries and organizations that many perceive to have the highest cybersecurity risk are often…

Why securing the software supply chain is an equally essential and challenging undertaking

During the past year, we’ve seen numerous incidents where highly-respected, and widely-utilized software solutions have…

How AI is improving constituent experience for the Maricopa County Clerk of the Superior Court

Artificial Intelligence (AI), machine learning, and other advanced applications have been revolutionizing customer experience and…

Pete Chestna, Checkmarx CISO, on the Technologies Enabling a Continuous ATO

With software becoming increasingly essential to today’s government and military, and digital transformation initiatives among…

Shifting Application Security Left Requires Changing Both Culture and Tools

In late August, the Advanced Technology Academic Research Center (ATARC) sponsored a Webinar in conjunction…

State Government Cloud Adoption Requires Cloud-Ready, Centralized AppSec

This article was originally featured on the Checkmarx blog. Click HERE to read the original…

application security
Seven reasons why federal agencies need a unified approach to application security

Today’s government agencies and military organizations are developing applications and digital services as fast as…

 

 

 

We launched GovDevSecOpsHub to focus on the next evolution of application development, DevSecOps, which brings cybersecurity teams and tools into the development process sooner so that applications are more secure and safeguarded against cyber threats.

In  GovDevSecOpsHub we’ll look at the evolution from traditional software and application development to the DevOps model. We’ll talk about the importance of moving from DevOps to DevSecOps. We’ll highlight the technologies and cultural changes necessary to make this shift happen. And we’ll profile government organizations and executives that are the “boots on the ground” as the government pivots towards the DevSecOps model.