An Open Source Solution to the Cycle of Veteran Suicide

This article was originally published on the Red Hat Blog. To read the original in its entirety, click HERE. In 2022, Red Hat teamed with global consulting services provider Guidehouse and Philip Held, Ph.D. of Rush University Medical Center, to…

Technology at the edge—How cloud computing has benefitted the DHS and DoD

Over the past two decades, cloud computing has exploded in popularity among businesses, organizations, agencies, and individuals. Today, the cloud is widely used across organizations and enterprises to make their IT architectures more scalable, and enable their organizations to provision…

Everything-As-Code Everywhere All at Once

As software and applications have become more mission-critical across the government, the need to develop and deploy new solutions and capabilities to the workforce quickly has increased. The need to rapidly develop and deploy secure applications has given rise to…

Keeping the Lights on with Event-Driven Automation

This article originally appeared on the Red Hat Blog. To read the original in its entirety, click HERE. IT operations teams face challenges in Day 2 operations. But what are Day 2 operations? According to Red Hat’s Bill Cozens, “We talk…

 

Recent News

An Introduction to Continuous Software Engineering

If you have read my other articles, I hope you can sense my passion for…

Securing Your Open Source Software Supply Chain

This article originally appeared on the Red Hat blog. To read the original in its…

DevSecOps, ATOs, and Segregation of Duties – Can These Things Coexist?

Government agencies and military organizations have historically placed barriers between the development and deployment of…

AI incorporated in UAV military drones
The new face of military power—How AI & ML are improving drones

Unmanned aerial vehicles (UAVs) may seem like a new advancement on the battlefield, but today’s…

An Introduction to Hardening

This article is part of a series on STIGs that was originally featured on the…

Three Considerations for Choosing a Cloud Automation Technology

This article is part of a larger post that was originally featured on the Red…

How CISA and NIST are Helping Agencies Develop Secure Software

As modernization continues to sweep across the entire federal government, all agencies are experiencing an…

Innovation Unleashed—How Government Agencies can Benefit From the Cloud

There are many benefits to moving government workloads, applications, and data from legacy hardware and…

Happy Holidays from the GovDevSecOpsHub Team

The GovDevSecOpsHub will be back with even more content in 2023. We would like to thank you…

Four Key Themes from the 2022 Red Hat Government Symposium

In early November, Red Hat sponsored their annual Red Hat Government Symposium 2022 at the Waldorf…

The Challenges that Agile Creates in the Public Sector

In the last episode of the ContinuousX Podcast, hosts Rick Stewart and Michael Fitzurka sat…

The Unintended Consequences of Agile

When the Agile Manifesto and the Agile approach to development were introduced, they were intended…

Newsletter

Enter your email address below to receive all the latest content to your inbox.

Please view our privacy policy and terms of use for more information on how we protect and manage your personal data.

Sponsored By
Powered by

 

 

 

We launched GovDevSecOpsHub to focus on the next evolution of application development, DevSecOps, which brings cybersecurity teams and tools into the development process sooner so that applications are more secure and safeguarded against cyber threats.

In  GovDevSecOpsHub we’ll look at the evolution from traditional software and application development to the DevOps model. We’ll talk about the importance of moving from DevOps to DevSecOps. We’ll highlight the technologies and cultural changes necessary to make this shift happen. And we’ll profile government organizations and executives that are the “boots on the ground” as the government pivots towards the DevSecOps model.