Two Challenges When Using Kubernetes in Air-Gapped Environments

Many compliance-minded organizations are seeking to capitalize on the benefits of production-grade Kubernetes in air-gapped environments. An air-gap, air-gapping, or disconnected network is a security measure to ensure that a computer network is physically isolated from insecure networks, like the…

Can Software Save Lives? Kessel Run Shows That It’s Possible!

In late July and early August of this year, America anxiously watched as – halfway across the globe – our country’s Department of Defense (DoD) worked tirelessly to evacuate more than 100,000 people from Afghanistan. This mission was a high-wire…

Pete Chestna, Checkmarx CISO, on the Technologies Enabling a Continuous ATO

With software becoming increasingly essential to today’s government and military, and digital transformation initiatives among the highest priorities within the IT departments of government organizations, there is a strong desire across the government to develop and implement new applications quickly.…

Team Collaboration, Tools, and Measurement – Three Areas of Focus for Successful DevSecOps Adoption

This article was originally featured on the Red Hat blog. To read the original in its entirety, click HERE. When it comes to DevSecOps adoption, organizations sometimes focus on overarching goals like improving business agility or digital transformation. Such a…

 

Recent News

Joyce Hunter of ICIT discusses building a better federal cyber workforce

On October 14 and October 15, 2020, top cybersecurity experts will be coming together for…

Why DevSecOps is a Hot Topic in the Federal Government – a Q&A with Maya Kaczorowski of GitHub

As we’ve heard from government and military IT leaders and decision-makers – from Nicolas Chaillan,…

Two Challenges Keeping Development Teams From Testing in Production

In a recent article on the GovDevSecOpsHub, we shared three key benefits that shifting testing…

Three Benefits of Testing in Production

In the past, the application and software development process followed a “waterfall” process. The software…

Three-Step Threat Modeling Process for More Secure Services

This article was originally written by Robert Reichel for the GitHub blog. To see the…

Adopt Static Analysis and Automation in Baby Steps

So far, 2020 has been a challenging year. As more of us work remotely from…

IoT
An Ounce of Prevention – Coding Standards and an Engineering Approach to Software

Software moved from the desktop to just about everything we touch. From smart thermostats, to…

The Infinite Game of Software Development Through DevSecOps

In his latest book “The Infinite Game,” Simon Sinek, an inspirational speaker on leadership, empathy,…

DevSecOps Delivers the Benefits of “Interchangeable Parts” to Government Application Development

This article was authored by Chris Yates, a Senior Solutions Architect at Red Hat, and…

Autonomous Cloud Enablement – Three Waves of DevOps Transformation

Government software and application development has historically been a slow process that often resulted in…

Increasing Resilience by Embracing Chaos Engineering

This article was authored by Caitlin Stanford, the Global Digital Marketing Manager at Eggplant, and…

What the New NIST Guidance Means for Embedding Security into DevOps

The conversation about hardening the software and technology used in the public sector is an…

Newsletter

Enter your email address below to receive all the latest content to your inbox.

Please view our privacy policy and terms of use for more information on how we protect and manage your personal data.

Sponsored By
Powered by

 

 

 

We launched GovDevSecOpsHub to focus on the next evolution of application development, DevSecOps, which brings cybersecurity teams and tools into the development process sooner so that applications are more secure and safeguarded against cyber threats.

In  GovDevSecOpsHub we’ll look at the evolution from traditional software and application development to the DevOps model. We’ll talk about the importance of moving from DevOps to DevSecOps. We’ll highlight the technologies and cultural changes necessary to make this shift happen. And we’ll profile government organizations and executives that are the “boots on the ground” as the government pivots towards the DevSecOps model.