Why securing the software supply chain is an equally essential and challenging undertaking

During the past year, we’ve seen numerous incidents where highly-respected, and widely-utilized software solutions have been exploited to launch highly-effective cyberattacks against their users. In many instances these solutions had vulnerabilities that malicious actors could exploit to compromise the networks…

How AI is improving constituent experience for the Maricopa County Clerk of the Superior Court

Artificial Intelligence (AI), machine learning, and other advanced applications have been revolutionizing customer experience and customer service within the private sector for a few years now. We’ve all seen conversational AI in action, with virtual assistants popping up in the…

Two Challenges When Using Kubernetes in Air-Gapped Environments

Many compliance-minded organizations are seeking to capitalize on the benefits of production-grade Kubernetes in air-gapped environments. An air-gap, air-gapping, or disconnected network is a security measure to ensure that a computer network is physically isolated from insecure networks, like the…

Can Software Save Lives? Kessel Run Shows That It’s Possible!

In late July and early August of this year, America anxiously watched as – halfway across the globe – our country’s Department of Defense (DoD) worked tirelessly to evacuate more than 100,000 people from Afghanistan. This mission was a high-wire…

Recent News

Pete Chestna, Checkmarx CISO, on the Technologies Enabling a Continuous ATO

With software becoming increasingly essential to today’s government and military, and digital transformation initiatives among…

Team Collaboration, Tools, and Measurement – Three Areas of Focus for Successful DevSecOps Adoption

This article was originally featured on the Red Hat blog. To read the original in…

Digital Transformation and the Revolutionary Power of Data on Display at the 2021 Red Hat Government Symposium

On November 16, 2021, Red Hat will be sponsoring its annual Red Hat Government Symposium,…

The Cloud Conundrum – Should I Migrate This Application to the Cloud?

The article was originally published on the Red Hat blog. To read the original in…

Shifting Application Security Left Requires Changing Both Culture and Tools

In late August, the Advanced Technology Academic Research Center (ATARC) sponsored a Webinar in conjunction…

State Government Cloud Adoption Requires Cloud-Ready, Centralized AppSec

This article was originally featured on the Checkmarx blog. Click HERE to read the original…

Preparing for a Post-Pandemic World with Automation and Modern Applications

COVID-19 compounded existing challenges for governments, colleges, universities, and teaching hospitals. These organizations were already…

Skill Tracks II: The Wrath of Kanban

I was re-watching Star Trek II: The Wrath of Khan the other night and I…

A Majority of Global Developers Desire More Secure Coding Education

The impact of COVID-19 has accelerated worldwide demand for increasing the provision of digital services,…

application security
Seven reasons why federal agencies need a unified approach to application security

Today’s government agencies and military organizations are developing applications and digital services as fast as…

What to Look for in a Security Scanning Solution

Pointing out problems is not necessarily a bad thing. But simply pointing out problems without…

AI and You – How AI Can Benefit From DevSecOps

If you are a connoisseur of trade shows and new product innovations like me, then…

Newsletter

Enter your email address below to receive all the latest content to your inbox.

Please view our privacy policy and terms of use for more information on how we protect and manage your personal data.

Upcoming Events

There are no upcoming events at this time.

Sponsored By
Powered by

 

 

 

We launched GovDevSecOpsHub to focus on the next evolution of application development, DevSecOps, which brings cybersecurity teams and tools into the development process sooner so that applications are more secure and safeguarded against cyber threats.

In  GovDevSecOpsHub we’ll look at the evolution from traditional software and application development to the DevOps model. We’ll talk about the importance of moving from DevOps to DevSecOps. We’ll highlight the technologies and cultural changes necessary to make this shift happen. And we’ll profile government organizations and executives that are the “boots on the ground” as the government pivots towards the DevSecOps model.