Four AppSec Threats Facing Healthcare Organizations

The industries and organizations that many perceive to have the highest cybersecurity risk are often the “usual suspects.” They include financial services and technology – industries that have a lot of resources, or proprietary, high-value data that can make a…

It’s Time for Government Solution Providers to Plot a Path to the Cloud

While offering a service or solution that still operates on-premise, on bare metal may seem as archaic and old-school as inserting a CD into a stereo to listen to music, it’s still quite common. Especially in the public sector, where…

The Challenges of Developing Applications for Air-Gapped Environments

By connecting networks and devices to the larger Internet, military, law enforcement, and other state, local, and federal government agencies are opening the door to cyber risks. In most instances, the risk is worth the benefits of connectivity. However, in…

Three Kubernetes Challenges Facing Today’s Government Agencies

The benefit of Kubernetes is that it makes it possible to manage and deploy modern applications with increased speed and efficiency. Kubernetes enables governments to continue their pursuit of coping with new realities and building a better future for their…

Developer Spotlight – SES GS Hails the Creation of the New Hydra Platform

The military’s network architecture is a patchwork of different systems and solutions that resulted from disparate organizations and branches operating in stovepipes to address their communications and connectivity requirements. The patchwork nature of the military’s networks extends all the way…

Let’s Rethink and Finally Adopt Continuous Deployment

Continuous Deployment is the familial outcast that no one talks about in the CI/CD world. It’s the “Jon Snow” of the Stark family for you Game of Thrones fans. And … no spoilers … like Jon, a true hero with…

NCDIT on establishing a digital transformation roadmap for the State of North Carolina

While the ongoing COVID pandemic may have accelerated government digital transformation initiatives, there has long been a desire across state, local and federal government agencies to increase the access to government programs and information through technology. But where do government…

Why securing the software supply chain is an equally essential and challenging undertaking

During the past year, we’ve seen numerous incidents where highly-respected, and widely-utilized software solutions have been exploited to launch highly-effective cyberattacks against their users. In many instances these solutions had vulnerabilities that malicious actors could exploit to compromise the networks…

How AI is improving constituent experience for the Maricopa County Clerk of the Superior Court

Artificial Intelligence (AI), machine learning, and other advanced applications have been revolutionizing customer experience and customer service within the private sector for a few years now. We’ve all seen conversational AI in action, with virtual assistants popping up in the…

Two Challenges When Using Kubernetes in Air-Gapped Environments

Many compliance-minded organizations are seeking to capitalize on the benefits of production-grade Kubernetes in air-gapped environments. An air-gap, air-gapping, or disconnected network is a security measure to ensure that a computer network is physically isolated from insecure networks, like the…

 

 

 

We launched GovDevSecOpsHub to focus on the next evolution of application development, DevSecOps, which brings cybersecurity teams and tools into the development process sooner so that applications are more secure and safeguarded against cyber threats.

In  GovDevSecOpsHub we’ll look at the evolution from traditional software and application development to the DevOps model. We’ll talk about the importance of moving from DevOps to DevSecOps. We’ll highlight the technologies and cultural changes necessary to make this shift happen. And we’ll profile government organizations and executives that are the “boots on the ground” as the government pivots towards the DevSecOps model.