Skill Tracks II: The Wrath of Kanban

I was re-watching Star Trek II: The Wrath of Khan the other night and I was reminded – once again – about how Lean management can be poorly implemented.  That may not be readily apparent, so walk with me for…

A Majority of Global Developers Desire More Secure Coding Education

The impact of COVID-19 has accelerated worldwide demand for increasing the provision of digital services, and in this digitized landscape, security is key. But digital transformation initiatives, combined with a hybrid workforce, have expanded attack surfaces and increased the chances…

Seven reasons why federal agencies need a unified approach to application security

Today’s government agencies and military organizations are developing applications and digital services as fast as they can to meet urgent needs. This rapid pace of application development only accelerated in 2020 when government IT departments and application development teams were…

What to Look for in a Security Scanning Solution

Pointing out problems is not necessarily a bad thing. But simply pointing out problems without offering solutions provides little value. This is true in many facets of life, but it also applies within the context of software security scanning.  security…

Recent News

AI and You – How AI Can Benefit From DevSecOps

If you are a connoisseur of trade shows and new product innovations like me, then…

Six Ways AST Keeps Digital Citizen Services Secure

When in-person processes became impossible during the pandemic, the extent to which public sector services…

Three Steps for Accelerating the ATO Process

This article originally appeared on the Checkmarx blog. Click HERE to read the original in…

PODCAST: AST, DevSecOps and Developer Training – Three Essential AppSec Tools

Massive cyberattacks and breaches that originated in applications, including the recent SolarWinds breach that impacted…

Combating State and Local Cyberthreats with a Centralized Approach to AppSe

This article was originally featured on the Checkmarx blog. Click HERE to read the original…

Five Reasons Why Agencies are Choosing SAST Over WAF

This article was originally featured on the Checkmarx blog. Click HERE to read the original…

Five Factors to Look for in an Application Security Solution

This article was originally published on the Checkmarx blog. To read the original in its…

Four Best Practices for Secure App Development in AWS

This article was originally featured on the Checkmarx blog. Click HERE to read the original…

Developer Spotlight – Kessel Run Makes Air Force History

Last month, the Air Force Life Cycle Management Center (AFLCMC)’s Detachment 12, which is better…

Colleges and Universities – the Next Big Target for Ransomware Attacks

The past few months have been witness to two massive ransomware attacks that have impacted…

AppSec Takes Center Stage in Biden Cybersecurity Executive Order

On May 12, 2021, the Biden White House released an Executive Order focused on cybersecurity…

Newsletter

Enter your email address below to receive all the latest content to your inbox.

Please view our privacy policy and terms of use for more information on how we protect and manage your personal data.

Upcoming Events
  1. All Day DevOps

    October 28
  2. NVIDIA GTC

    November 8 - November 11
  3. AFCEA Indo-Pacific

    November 8 @ 8:00 am - November 10 @ 5:00 pm
Sponsored By
Powered by

 

 

 

We launched GovDevSecOpsHub to focus on the next evolution of application development, DevSecOps, which brings cybersecurity teams and tools into the development process sooner so that applications are more secure and safeguarded against cyber threats.

In  GovDevSecOpsHub we’ll look at the evolution from traditional software and application development to the DevOps model. We’ll talk about the importance of moving from DevOps to DevSecOps. We’ll highlight the technologies and cultural changes necessary to make this shift happen. And we’ll profile government organizations and executives that are the “boots on the ground” as the government pivots towards the DevSecOps model.