Securing Your Open Source Software Supply Chain

This article originally appeared on the Red Hat blog. To read the original in its entirety, click HERE. As an engineer on the Supply Chain team, the more I dive into software development, the more I have come to understand…

DevSecOps, ATOs, and Segregation of Duties – Can These Things Coexist?

Government agencies and military organizations have historically placed barriers between the development and deployment of new applications – and for very good reason. When sensitive constituent data is on the line, it’s essential that these applications are secure. And, in…

The new face of military power—How AI & ML are improving drones

Unmanned aerial vehicles (UAVs) may seem like a new advancement on the battlefield, but today’s modern UAVs – or drones as they’re commonly known – are the evolution of a technology that was used in the Vietnam War. Back then,…

An Introduction to Hardening

This article is part of a series on STIGs that was originally featured on the Red Hat blog. To read this article – and the STIG series – in full, click HERE. Secure Technology Implementation Guides (STIGs) as a framework…

 

Recent News

Not All Software Vulnerabilities are the Same…

This article was originally published on the Red Hat Blog. To read the original in…

DevSecOps as a Risk Management Strategy?

In the last episode of the ContinuousX Podcast, hosts Mike Fitzurka and Rick Stewart of…

Maximizing existing IT investments in times of uncertainty

This article is part of a longer piece originally published on the Red Hat blog.…

How Application Performance Optimization Advances Agency Goals

When COVID-19 reached American shores, federal government agencies were forced to quickly redefine their operating…

Red Hat and IBM Launch Project Wisdom to Enable Enterprise IT Automation

As IT systems expand into heterogeneous environments, the complexity of managing workloads can be more…

Agile 2 – A New Approach to Agile for a Modern World

The Agile Manifesto that was released in the early 2000s was a massive step in…

How federal and SLED agencies are bolstering their cybersecurity postures with DevSecOps

As the federal government and SLED organizations continue to digitally transform their systems, networks, and…

The Benefits of Open Source Edge Solutions in Rail Transportation 

This article was originally featured on the Red Hat blog. You can read the original…

6 Security Tips for Open Source Developers

For many, writing a computer program isn’t that hard—it simply requires a certain amount of…

How UTSA Transformed its Student Service Infrastructure

The University of Texas at San Antonio (UTSA) is a critical gateway to higher education…

Four Government Use Cases for Edge Automation

This post is part of a larger article that was originally featured on the Red…

Four Benefits of Application Performance Optimization

As the waves of digital transformation continue to spread across and reach all corners of…

Newsletter

Enter your email address below to receive all the latest content to your inbox.

Please view our privacy policy and terms of use for more information on how we protect and manage your personal data.

Sponsored By
Powered by

 

 

 

We launched GovDevSecOpsHub to focus on the next evolution of application development, DevSecOps, which brings cybersecurity teams and tools into the development process sooner so that applications are more secure and safeguarded against cyber threats.

In  GovDevSecOpsHub we’ll look at the evolution from traditional software and application development to the DevOps model. We’ll talk about the importance of moving from DevOps to DevSecOps. We’ll highlight the technologies and cultural changes necessary to make this shift happen. And we’ll profile government organizations and executives that are the “boots on the ground” as the government pivots towards the DevSecOps model.