DevSecOps Is Alive and Well Within Platform Engineering

In recent times, there’s been a growing chorus proclaiming “DevSecOps is Dead” while singing the praises of platform engineering. But let me make this clear: DevSecOps is very much alive and thriving within the realm of platform engineering. The reports…

Open Source Without the Risk – How the Government Can Secure the Software Supply Chain

Earlier this month Checkmarx participated in a Webinar featuring cybersecurity leaders from across the federal government and its private sector partners to discuss one of the largest cyber challenges facing agencies today – software vulnerabilities in the open source solutions…

Tools and Strategies for Improving Containerization Security

According to the key findings based on IBM Security analysis of research data compiled by Ponemon Institute, the average total cost of a data breach reached an all-time high of USD 4.45 million in 2023. The latest report states that the…

Applying Generative AI to Business Applications

This article originally appeared on the Red Hat blog. To read the original in its entirety, click HERE. Rapid advancements in artificial intelligence (AI) have created a new frontier in business innovation. Significant progress in computing power, data storage, and…

7 Common Application Modernization Problems

This article was originally published on the Red Hat Blog. Click HERE to read the original in its entirety. We all want to do the right thing. We all want the best outcome. Which means, we all need to abide…

Fighting Cloud “Sticker Shock” with FinOps

Those of our readers “seasoned” enough to remember how cellular phones and phone plans worked prior to the proliferation of nationwide and global unlimited voice and data plans most likely remember – rather unfondly – the dread they would feel…

DevSecOps is Not About AI (But They Do Taste Great Together)

Okay, I know what you’re thinking: “Not another article about AI!” And this isn’t… not really. This is about DevSecOps, but Artificial Intelligence (AI) is the reason for my reaffirmation. On my news feed (which is a highly-technical series of…

Four Usage Models of Confidential Computing

This is the third article in a series on confidential computing published originally on the Red Hat blog. To read the original in its entirety, click HERE. In the existing implementations (with the notable exception of Intel SGX), confidential computing is fundamentally…

The Need for Attestation In Confidential Computing

This is the second article in a series on confidential computing published originally on the Red Hat blog. To read the original in its entirety, click HERE. In a confidential computing environment, another form of proof called attestation becomes increasingly…

Three Key Findings from Red Hat’s 2023 State of Kubernetes Security Report

Earlier this month, Red Hat released its The State of Kubernetes Security for 2023 report. This annual report explores the specific security risks organizations face regarding cloud-native development, including risks to their software supply chain, and how they mitigate these risks…

 

 

 

We launched GovDevSecOpsHub to focus on the next evolution of application development, DevSecOps, which brings cybersecurity teams and tools into the development process sooner so that applications are more secure and safeguarded against cyber threats.

In  GovDevSecOpsHub we’ll look at the evolution from traditional software and application development to the DevOps model. We’ll talk about the importance of moving from DevOps to DevSecOps. We’ll highlight the technologies and cultural changes necessary to make this shift happen. And we’ll profile government organizations and executives that are the “boots on the ground” as the government pivots towards the DevSecOps model.