Three Steps for Accelerating the ATO Process

This article originally appeared on the Checkmarx blog. Click HERE to read the original in its entirety. An ATO or Authority to Operate is an authorization process that a software system needs to have before the agency can use it…

PODCAST: AST, DevSecOps and Developer Training – Three Essential AppSec Tools

Massive cyberattacks and breaches that originated in applications, including the recent SolarWinds breach that impacted as many as ten government agencies, and the more recent Kaseya breach which may have impacted hundreds of companies, have rightfully raised questions about application…

Combating State and Local Cyberthreats with a Centralized Approach to AppSec

This article was originally featured on the Checkmarx blog. Click HERE to read the original in its entirety. Within state and local governments across the US, citizens using online services can pay taxes and fees, register for libraries, register to…

Five Reasons Why Agencies are Choosing SAST Over WAF

This article was originally featured on the Checkmarx blog. Click HERE to read the original in its entirety. Today’s Application Security (AppSec) measures focus on protecting web applications. These measures include methods of preventing data or code within the application…

 

Recent News

DevSecOps vs SecDevOps: Yes, There is a Difference!

This article was authored and submitted by Mark Lambert, VP of Products at Parasoft. It…

Four Essential Steps for Building an Effective DevSecOps Culture

The evolution from traditional software and application development towards DevOps – and now to DevSecOps…

DevOps is Desired but Security is Required: Bringing Them Together with DevSecOps

This article was written and submitted by Ben Chicoski of CloudBees. It was originally published…

DevSecOps
Three Key Characteristics of DevSecOps

In previous articles on the GovDevSecOpsHub, we explored the evolution from traditional application development to…

DevSecOps
It’s Time to Evolve from DevOps to DevSecOps

As I discussed in my last piece on the GovDevSecOpsHub, the DevOps approach to software…

DevOps: Why it’s Important and Why it’s Not Enough

Over the past decade we’ve seen a movement away from traditional, siloed software and application…

Newsletter

Enter your email address below to receive all the latest content to your inbox.

Please view our privacy policy and terms of use for more information on how we protect and manage your personal data.

Sponsored By
Powered by

 

 

 

We launched GovDevSecOpsHub to focus on the next evolution of application development, DevSecOps, which brings cybersecurity teams and tools into the development process sooner so that applications are more secure and safeguarded against cyber threats.

In  GovDevSecOpsHub we’ll look at the evolution from traditional software and application development to the DevOps model. We’ll talk about the importance of moving from DevOps to DevSecOps. We’ll highlight the technologies and cultural changes necessary to make this shift happen. And we’ll profile government organizations and executives that are the “boots on the ground” as the government pivots towards the DevSecOps model.