Value Stream Thinking – The Why Behind DevSecOps

Value stream thinking is not a revolutionary concept. Looking at famous companies like the Ford or Toyota motor companies, it’s easy to see many famous examples of maximizing value and minimizing waste. Each has found success, and each has its…

Increasing the AppSec of Complex, Containerized Applications – a Q&A with Michael Epley of Red Hat

In January of this year, Red Hat announced that it was acquiring StackRox, a leading provider of container and Kubernetes security software solutions. The acquisition was expected to add a number of complementary application security capabilities to Red Hat’s already…

Making Software Audits Easier by Establishing Audit-Ready Pipelines

Software audits play an essential role in ensuring the quality and performance of the applications that government agencies and contractors are developing. Audits are essential for ensuring applications are secure, identifying vulnerabilities that may be – or have already been…

Developer Spotlight – DevSecOps Helps goTenna Deliver Secure Communications to the Military

DevSecOps is rapidly gaining traction within the federal government and with the IT solution providers and contractors that service both the federal government and military. And for very good reason. Evolving away from traditional forms of application development – such…

Recent News

How the Air Force and SSA Navigate the (Sometimes Bumpy) Road to DevSecOps

Software and applications have taken on an outsized role in today’s government – helping agencies…

Opinionated Software – What it is and How it Enables DevOps

This article is a selection from a longer post authored by Christian Meléndezis for the…

What is SRE? Five Things You Need to Know…

This article was originally featured on the Dynatrace Blog. Click HERE to read the original…

Four Best Practices for Securing Cloud-Native Applications

This article is part of a larger piece on cloud-native applications originally published on TechBeacon.com…

Healthcare Organizations Embrace Open Source to Improve Operations

The healthcare industry focuses much of its innovation, research and development on new patient procedures,…

Everyone Into the Platform One Pool!

The Air Force wants to open its Platform One services to private sector partnerships with…

Four Ways to Combat Developer Burnout

There is no lack of high-stress industries and occupations that have to battle against burnout…

Security as Code — Making Application Development Faster and Safer

Right in the middle of the holiday season, as much of the world was preparing…

From “Trust but Verify” to “Never Trust” – the Importance of AST in application development

In our last article on the GovDevSecOpsHub, we sat down with Peter Archibald, the Regional…

Application Security Testing Makes its Way into the Iron Bank

In early December, software security solution provider, Checkmarx, announced that its application security testing (AST)…

Move it left, all the way left – Application Security as strategy creates advantages

Security vulnerabilities in code are often seen as failures of the application development process since…

Five Common Encryption Key Management Challenges

The “security by obscurity” obfuscation method involves concealing details of encryption algorithms to make them…

Newsletter

Enter your email address below to receive all the latest content to your inbox.

Please view our privacy policy and terms of use for more information on how we protect and manage your personal data.

Upcoming Events
  1. DynatraceGo! Modernize Your Agency

    June 29 @ 11:00 am - 1:35 pm
Sponsored By
Powered by

 

 

 

We launched GovDevSecOpsHub to focus on the next evolution of application development, DevSecOps, which brings cybersecurity teams and tools into the development process sooner so that applications are more secure and safeguarded against cyber threats.

In  GovDevSecOpsHub we’ll look at the evolution from traditional software and application development to the DevOps model. We’ll talk about the importance of moving from DevOps to DevSecOps. We’ll highlight the technologies and cultural changes necessary to make this shift happen. And we’ll profile government organizations and executives that are the “boots on the ground” as the government pivots towards the DevSecOps model.