By connecting networks and devices to the larger Internet, military, law enforcement, and other state, local, and federal government agencies are opening the door to cyber risks. In most instances, the risk is worth the benefits of connectivity. However, in…
Developer Spotlight – SES GS Hails the Creation of the New Hydra Platform
The military’s network architecture is a patchwork of different systems and solutions that resulted from disparate organizations and branches operating in stovepipes to address their communications and connectivity requirements. The patchwork nature of the military’s networks extends all the way…
Why securing the software supply chain is an equally essential and challenging undertaking
During the past year, we’ve seen numerous incidents where highly-respected, and widely-utilized software solutions have been exploited to launch highly-effective cyberattacks against their users. In many instances these solutions had vulnerabilities that malicious actors could exploit to compromise the networks…
How AI is improving constituent experience for the Maricopa County Clerk of the Superior Court
Artificial Intelligence (AI), machine learning, and other advanced applications have been revolutionizing customer experience and customer service within the private sector for a few years now. We’ve all seen conversational AI in action, with virtual assistants popping up in the…
Two Challenges When Using Kubernetes in Air-Gapped Environments
Many compliance-minded organizations are seeking to capitalize on the benefits of production-grade Kubernetes in air-gapped environments. An air-gap, air-gapping, or disconnected network is a security measure to ensure that a computer network is physically isolated from insecure networks, like the…
Digital Transformation and the Revolutionary Power of Data on Display at the 2021 Red Hat Government Symposium
On November 16, 2021, Red Hat will be sponsoring its annual Red Hat Government Symposium, which promises to bring together, “top IT leaders from federal, state, and local agencies, as well as industry partners and Red Hat experts,” to discuss…
Managing the Risks of Open Source Code
Most organizations with in-house development teams maintain their own code bases. Their developers write most of the code for those codebases themselves. However, they may choose to add third-party open source code to their codebases, for several reasons. The most…
Three Kubernetes Challenges Facing Government Development Teams
In a recent series of articles on the GovDevSecOpsHub, we discussed Kubernetes and how it has become an integral part of the application development and deployment process for application development teams that work with or on behalf of the federal…