Four Usage Models of Confidential Computing

This is the third article in a series on confidential computing published originally on the Red Hat blog. To read the original in its entirety, click HERE. In the existing implementations (with the notable exception of Intel SGX), confidential computing is fundamentally…

DevSecFinOps? Introducing FinOps in the Public Sector

We all know what the different parts of DevSecOps stand for and why there has been a movement to make each of these disparate elements work in tandem to accelerate and improve the application development process. By having the “Sec”…

The Need for Attestation In Confidential Computing

This is the second article in a series on confidential computing published originally on the Red Hat blog. To read the original in its entirety, click HERE. In a confidential computing environment, another form of proof called attestation becomes increasingly…

An Introduction to Confidential Computing

This is the first article in a six-part series on Confidential Computing being featured on the Red Hat blog. Click HERE to read the original in its entirety. More than two decades ago, the computing industry saw a need to…

Recent News

Happy Holidays from the GovDevSecOpsHub Team

The GovDevSecOpsHub will be back with even more content in 2023. We would like to thank you…

Four Key Themes from the 2022 Red Hat Government Symposium

In early November, Red Hat sponsored their annual Red Hat Government Symposium 2022 at the Waldorf…

The Challenges that Agile Creates in the Public Sector

In the last episode of the ContinuousX Podcast, hosts Rick Stewart and Michael Fitzurka sat…

The Unintended Consequences of Agile

When the Agile Manifesto and the Agile approach to development were introduced, they were intended…

The AppSec Threats Facing Government Agencies

For IT professionals who develop the technologies, applications, and services that federal, state, and local…

Not All Software Vulnerabilities are the Same…

This article was originally published on the Red Hat Blog. To read the original in…

DevSecOps as a Risk Management Strategy?

In the last episode of the ContinuousX Podcast, hosts Mike Fitzurka and Rick Stewart of…

Maximizing existing IT investments in times of uncertainty

This article is part of a longer piece originally published on the Red Hat blog.…

How Application Performance Optimization Advances Agency Goals

When COVID-19 reached American shores, federal government agencies were forced to quickly redefine their operating…

Red Hat and IBM Launch Project Wisdom to Enable Enterprise IT Automation

As IT systems expand into heterogeneous environments, the complexity of managing workloads can be more…

Agile 2 – A New Approach to Agile for a Modern World

The Agile Manifesto that was released in the early 2000s was a massive step in…

How federal and SLED agencies are bolstering their cybersecurity postures with DevSecOps

As the federal government and SLED organizations continue to digitally transform their systems, networks, and…

Newsletter

Enter your email address below to receive all the latest content to your inbox.

Please view our privacy policy and terms of use for more information on how we protect and manage your personal data.

Sponsored By
Powered by

 

 

 

We launched GovDevSecOpsHub to focus on the next evolution of application development, DevSecOps, which brings cybersecurity teams and tools into the development process sooner so that applications are more secure and safeguarded against cyber threats.

In  GovDevSecOpsHub we’ll look at the evolution from traditional software and application development to the DevOps model. We’ll talk about the importance of moving from DevOps to DevSecOps. We’ll highlight the technologies and cultural changes necessary to make this shift happen. And we’ll profile government organizations and executives that are the “boots on the ground” as the government pivots towards the DevSecOps model.