An Introduction to Hardening

This article is part of a series on STIGs that was originally featured on the Red Hat blog. To read this article – and the STIG series – in full, click HERE. Secure Technology Implementation Guides (STIGs) as a framework…

Three Considerations for Choosing a Cloud Automation Technology

This article is part of a larger post that was originally featured on the Red Hat blog. To read the original in its entirety, click HERE. Large organizations are crossing a new threshold in their cloud adoption journey. Whether they…

How CISA and NIST are Helping Agencies Develop Secure Software

As modernization continues to sweep across the entire federal government, all agencies are experiencing an influx of new data and information that are becoming juicy targets for hackers to get their hands on. This is unfortunate timing, as cyber attackers…

Four Key Themes from the 2022 Red Hat Government Symposium

In early November, Red Hat sponsored their annual Red Hat Government Symposium 2022 at the Waldorf Astoria in Washington, D.C. With an overarching theme of “Innovation Unleashed,” the one-day event was packed with eight insightful keynotes and panels delivered by nearly…

The Challenges that Agile Creates in the Public Sector

In the last episode of the ContinuousX Podcast, hosts Rick Stewart and Michael Fitzurka sat down with Cliff Berg, one of the coauthors of “Agile 2: The Next Iteration of Agile,” about the unintended consequences of the Agile method of application…

The Unintended Consequences of Agile

When the Agile Manifesto and the Agile approach to development were introduced, they were intended to provide a new, more efficient approach to application development that expedited processes and resulted in better products. However, much like with any new technology,…

The AppSec Threats Facing Government Agencies

For IT professionals who develop the technologies, applications, and services that federal, state, and local government agencies employ, there is one specific challenge that they always find themselves brushing up against. When government agencies request new applications and expect them…

Not All Software Vulnerabilities are the Same…

This article was originally published on the Red Hat Blog. To read the original in its entirety, click HERE. Vulnerabilities in software are a global concern, and open source software is no different from proprietary software in this regard. Any…

DevSecOps as a Risk Management Strategy?

In the last episode of the ContinuousX Podcast, hosts Mike Fitzurka and Rick Stewart of TD SYNNEX Public Sector were joined by Cliff Berg, one of the coauthors of Agile 2: The Next Iteration of Agile, for a discussion about Agile…

Maximizing existing IT investments in times of uncertainty

This article is part of a longer piece originally published on the Red Hat blog. Click HERE to read the original in its entirety. We live in uncertain and unpredictable times. Business leaders may be tempted to batten down the…

 

 

 

We launched GovDevSecOpsHub to focus on the next evolution of application development, DevSecOps, which brings cybersecurity teams and tools into the development process sooner so that applications are more secure and safeguarded against cyber threats.

In  GovDevSecOpsHub we’ll look at the evolution from traditional software and application development to the DevOps model. We’ll talk about the importance of moving from DevOps to DevSecOps. We’ll highlight the technologies and cultural changes necessary to make this shift happen. And we’ll profile government organizations and executives that are the “boots on the ground” as the government pivots towards the DevSecOps model.