A Majority of Global Developers Desire More Secure Coding Education

The impact of COVID-19 has accelerated worldwide demand for increasing the provision of digital services, and in this digitized landscape, security is key. But digital transformation initiatives, combined with a hybrid workforce, have expanded attack surfaces and increased the chances…

Seven reasons why federal agencies need a unified approach to application security

Today’s government agencies and military organizations are developing applications and digital services as fast as they can to meet urgent needs. This rapid pace of application development only accelerated in 2020 when government IT departments and application development teams were…

Heading Off Risk: A Unified Approach to Application Security and Delivery

The U.S. federal government is developing applications and digital services as fast as it can to meet urgent needs. In addition to contending with accelerated deployment schedules, accelerated ATO, and demands for complex functionality, federal development teams must still perform…

What to Look for in a Security Scanning Solution

Pointing out problems is not necessarily a bad thing. But simply pointing out problems without offering solutions provides little value. This is true in many facets of life, but it also applies within the context of software security scanning.  security…

Six Ways AST Keeps Digital Citizen Services Secure

When in-person processes became impossible during the pandemic, the extent to which public sector services relied on them became apparent. Town halls, municipal offices, schools, and colleges were forced to close their doors to the public, and the need to…

Three Steps for Accelerating the ATO Process

This article originally appeared on the Checkmarx blog. Click HERE to read the original in its entirety. An ATO or Authority to Operate is an authorization process that a software system needs to have before the agency can use it…

PODCAST: AST, DevSecOps and Developer Training – Three Essential AppSec Tools

Massive cyberattacks and breaches that originated in applications, including the recent SolarWinds breach that impacted as many as ten government agencies, and the more recent Kaseya breach which may have impacted hundreds of companies, have rightfully raised questions about application…

Combating State and Local Cyberthreats with a Centralized Approach to AppSec

This article was originally featured on the Checkmarx blog. Click HERE to read the original in its entirety. Within state and local governments across the US, citizens using online services can pay taxes and fees, register for libraries, register to…

Five Reasons Why Agencies are Choosing SAST Over WAF

This article was originally featured on the Checkmarx blog. Click HERE to read the original in its entirety. Today’s Application Security (AppSec) measures focus on protecting web applications. These measures include methods of preventing data or code within the application…

 

 

 

We launched GovDevSecOpsHub to focus on the next evolution of application development, DevSecOps, which brings cybersecurity teams and tools into the development process sooner so that applications are more secure and safeguarded against cyber threats.

In  GovDevSecOpsHub we’ll look at the evolution from traditional software and application development to the DevOps model. We’ll talk about the importance of moving from DevOps to DevSecOps. We’ll highlight the technologies and cultural changes necessary to make this shift happen. And we’ll profile government organizations and executives that are the “boots on the ground” as the government pivots towards the DevSecOps model.