4 Steps for Increasing Competition in the Government Acquisition Process

This article is part of a larger piece that was previously published on the Appian Blog. Click HERE to read the original in its entirety. It is in the best interest of the government to encourage competition between vendors to…

Going Back to the Future with Pair Programming

I might be dating myself here, but I worked through the era when companies were hiring people off the street with no computer experience to teach them COBOL because it was just that hot. It didn’t work out so well,…

Making the Case for Case Management in the Government

Today’s government agencies have massive and important missions and a seemingly endless amount of work to accomplish. And many of them are having to accomplish these essential missions with a less-than-optimal amount of resources and employees. From tight budgets that…

5 Considerations for Managing the Government Acquisition Lifecycle

This article originally appeared on the Appian Blog. To read the original in its entirety, click HERE. Acquisitions impact every aspect of the public sector—every local, state, and federal government agency needs to buy goods and services to achieve mission…

Recent News

7 Common Application Modernization Problems

This article was originally published on the Red Hat Blog. Click HERE to read the…

Fighting Cloud “Sticker Shock” with FinOps

Those of our readers “seasoned” enough to remember how cellular phones and phone plans worked…

Overcoming the IT Modernization Challenges Facing Government Agencies

In late May, Red Hat held its Red Hat Summit and AnsibleFest event. This annual…

DevSecOps is Not About AI (But They Do Taste Great Together)

Okay, I know what you’re thinking: “Not another article about AI!” And this isn’t… not…

Four Usage Models of Confidential Computing

This is the third article in a series on confidential computing published originally on the…

DevSecFinOps? Introducing FinOps in the Public Sector

We all know what the different parts of DevSecOps stand for and why there has…

The Need for Attestation In Confidential Computing

This is the second article in a series on confidential computing published originally on the…

An Introduction to Confidential Computing

This is the first article in a six-part series on Confidential Computing being featured on…

Public sector cloud migration
Public sector cloud migration strategies—How these help pave the way for successful IT modernization

From tech layoffs to hiring freezes, it’s no secret that the IT industry has been…

Three Key Findings from Red Hat’s 2023 State of Kubernetes Security Report

Earlier this month, Red Hat released its The State of Kubernetes Security for 2023 report. This…

DevSecOps is NOT About Security

Click-bait aside…I am tired of seeing articles and presentations about DevSecOps only to find out…

Exploring the Cyber Risks of Microservices

As the need to develop applications more quickly – at the pace of innovation –…

Newsletter

Enter your email address below to receive all the latest content to your inbox.

Please view our privacy policy and terms of use for more information on how we protect and manage your personal data.

Sponsored By
Powered by

 

 

 

We launched GovDevSecOpsHub to focus on the next evolution of application development, DevSecOps, which brings cybersecurity teams and tools into the development process sooner so that applications are more secure and safeguarded against cyber threats.

In  GovDevSecOpsHub we’ll look at the evolution from traditional software and application development to the DevOps model. We’ll talk about the importance of moving from DevOps to DevSecOps. We’ll highlight the technologies and cultural changes necessary to make this shift happen. And we’ll profile government organizations and executives that are the “boots on the ground” as the government pivots towards the DevSecOps model.