7 Common Application Modernization Problems

This article was originally published on the Red Hat Blog. Click HERE to read the original in its entirety. We all want to do the right thing. We all want the best outcome. Which means, we all need to abide…

Fighting Cloud “Sticker Shock” with FinOps

Those of our readers “seasoned” enough to remember how cellular phones and phone plans worked prior to the proliferation of nationwide and global unlimited voice and data plans most likely remember – rather unfondly – the dread they would feel…

Overcoming the IT Modernization Challenges Facing Government Agencies

In late May, Red Hat held its Red Hat Summit and AnsibleFest event. This annual summit brings together some of the world’s leading technology experts, executives, and IT leaders to discuss the trends shaping organizational IT initiatives and share the…

DevSecOps is Not About AI (But They Do Taste Great Together)

Okay, I know what you’re thinking: “Not another article about AI!” And this isn’t… not really. This is about DevSecOps, but Artificial Intelligence (AI) is the reason for my reaffirmation. On my news feed (which is a highly-technical series of…

Recent News

An Open Source Solution to the Cycle of Veteran Suicide

This article was originally published on the Red Hat Blog. To read the original in…

Cloud computing
Technology at the edge—How cloud computing has benefitted the DHS and DoD

Over the past two decades, cloud computing has exploded in popularity among businesses, organizations, agencies,…

Everything-As-Code Everywhere All at Once

As software and applications have become more mission-critical across the government, the need to develop…

Keeping the Lights on with Event-Driven Automation

This article originally appeared on the Red Hat Blog. To read the original in its…

An Introduction to Continuous Software Engineering

If you have read my other articles, I hope you can sense my passion for…

Securing Your Open Source Software Supply Chain

This article originally appeared on the Red Hat blog. To read the original in its…

DevSecOps, ATOs, and Segregation of Duties – Can These Things Coexist?

Government agencies and military organizations have historically placed barriers between the development and deployment of…

AI incorporated in UAV military drones
The new face of military power—How AI & ML are improving drones

Unmanned aerial vehicles (UAVs) may seem like a new advancement on the battlefield, but today’s…

An Introduction to Hardening

This article is part of a series on STIGs that was originally featured on the…

Three Considerations for Choosing a Cloud Automation Technology

This article is part of a larger post that was originally featured on the Red…

How CISA and NIST are Helping Agencies Develop Secure Software

As modernization continues to sweep across the entire federal government, all agencies are experiencing an…

Innovation Unleashed—How Government Agencies can Benefit From the Cloud

There are many benefits to moving government workloads, applications, and data from legacy hardware and…

Newsletter

Enter your email address below to receive all the latest content to your inbox.

Please view our privacy policy and terms of use for more information on how we protect and manage your personal data.

Sponsored By
Powered by

 

 

 

We launched GovDevSecOpsHub to focus on the next evolution of application development, DevSecOps, which brings cybersecurity teams and tools into the development process sooner so that applications are more secure and safeguarded against cyber threats.

In  GovDevSecOpsHub we’ll look at the evolution from traditional software and application development to the DevOps model. We’ll talk about the importance of moving from DevOps to DevSecOps. We’ll highlight the technologies and cultural changes necessary to make this shift happen. And we’ll profile government organizations and executives that are the “boots on the ground” as the government pivots towards the DevSecOps model.