Let’s Rethink and Finally Adopt Continuous Deployment

Continuous Deployment is the familial outcast that no one talks about in the CI/CD world. It’s the “Jon Snow” of the Stark family for you Game of Thrones fans. And … no spoilers … like Jon, a true hero with…

NCDIT on establishing a digital transformation roadmap for the State of North Carolina

While the ongoing COVID pandemic may have accelerated government digital transformation initiatives, there has long been a desire across state, local and federal government agencies to increase the access to government programs and information through technology. But where do government…

Why securing the software supply chain is an equally essential and challenging undertaking

During the past year, we’ve seen numerous incidents where highly-respected, and widely-utilized software solutions have been exploited to launch highly-effective cyberattacks against their users. In many instances these solutions had vulnerabilities that malicious actors could exploit to compromise the networks…

How AI is improving constituent experience for the Maricopa County Clerk of the Superior Court

Artificial Intelligence (AI), machine learning, and other advanced applications have been revolutionizing customer experience and customer service within the private sector for a few years now. We’ve all seen conversational AI in action, with virtual assistants popping up in the…

Two Challenges When Using Kubernetes in Air-Gapped Environments

Many compliance-minded organizations are seeking to capitalize on the benefits of production-grade Kubernetes in air-gapped environments. An air-gap, air-gapping, or disconnected network is a security measure to ensure that a computer network is physically isolated from insecure networks, like the…

Pete Chestna, Checkmarx CISO, on the Technologies Enabling a Continuous ATO

With software becoming increasingly essential to today’s government and military, and digital transformation initiatives among the highest priorities within the IT departments of government organizations, there is a strong desire across the government to develop and implement new applications quickly.…

Team Collaboration, Tools, and Measurement – Three Areas of Focus for Successful DevSecOps Adoption

This article was originally featured on the Red Hat blog. To read the original in its entirety, click HERE. When it comes to DevSecOps adoption, organizations sometimes focus on overarching goals like improving business agility or digital transformation. Such a…

Digital Transformation and the Revolutionary Power of Data on Display at the 2021 Red Hat Government Symposium

On November 16, 2021, Red Hat will be sponsoring its annual Red Hat Government Symposium, which promises to bring together, “top IT leaders from federal, state, and local agencies, as well as industry partners and Red Hat experts,” to discuss…

The Cloud Conundrum – Should I Migrate This Application to the Cloud?

The article was originally published on the Red Hat blog. To read the original in its entirety, click HERE. Public and private clouds often breathe life into existing applications with more flexibility, simpler maintenance, and better performance. However, these lift…

Shifting Application Security Left Requires Changing Both Culture and Tools

In late August, the Advanced Technology Academic Research Center (ATARC) sponsored a Webinar in conjunction with Checkmarx and Invicti entitled, “Shifting Security Left with DevSecOps.” This virtual panel discussion featured prominent application development leaders and experts from both the government…

 

 

 

We launched GovDevSecOpsHub to focus on the next evolution of application development, DevSecOps, which brings cybersecurity teams and tools into the development process sooner so that applications are more secure and safeguarded against cyber threats.

In  GovDevSecOpsHub we’ll look at the evolution from traditional software and application development to the DevOps model. We’ll talk about the importance of moving from DevOps to DevSecOps. We’ll highlight the technologies and cultural changes necessary to make this shift happen. And we’ll profile government organizations and executives that are the “boots on the ground” as the government pivots towards the DevSecOps model.