Those of our readers “seasoned” enough to remember how cellular phones and phone plans worked prior to the proliferation of nationwide and global unlimited voice and data plans most likely remember – rather unfondly – the dread they would feel…
Gartner Study Finds Adoption of Containerized Databases Increasing
This article was originally published on the Red Hat Blog. Click HERE to read the original article in its entirety. Databases have been traditionally viewed as the definition of a monolith — never intended to be broken down into microservices…
The Challenges of Developing Applications for Air-Gapped Environments
By connecting networks and devices to the larger Internet, military, law enforcement, and other state, local, and federal government agencies are opening the door to cyber risks. In most instances, the risk is worth the benefits of connectivity. However, in…
Three Kubernetes Challenges Facing Today’s Government Agencies
The benefit of Kubernetes is that it makes it possible to manage and deploy modern applications with increased speed and efficiency. Kubernetes enables governments to continue their pursuit of coping with new realities and building a better future for their…
Two Challenges When Using Kubernetes in Air-Gapped Environments
Many compliance-minded organizations are seeking to capitalize on the benefits of production-grade Kubernetes in air-gapped environments. An air-gap, air-gapping, or disconnected network is a security measure to ensure that a computer network is physically isolated from insecure networks, like the…
What the StackRox Acquisition Means for Red Hat Customers – a Q&A with Michael Epley
Following their January 2021 acquisition of StackRox, the GovDevSecOpsHub sat down with Red Hat’s Chief Architect and Security Strategist for Public Sector, Michael Epley, for an in-depth, three-part interview series about the security challenges that today’s more complicated applications create…
Meeting Government Compliance and Security Challenges – a Q&A with Michael Epley of Red Hat
In a recent article on the GovDevSecOpsHub, we featured the first of a three-part interview series with Michael Epley, the Chief Architect and Security Strategist for Public Sector at Red Hat. We sat down with Michael following the company’s announcement…
Increasing the AppSec of Complex, Containerized Applications – a Q&A with Michael Epley of Red Hat
In January of this year, Red Hat announced that it was acquiring StackRox, a leading provider of container and Kubernetes security software solutions. The acquisition was expected to add a number of complementary application security capabilities to Red Hat’s already…
Developer Spotlight – DevSecOps Helps goTenna Deliver Secure Communications to the Military
DevSecOps is rapidly gaining traction within the federal government and with the IT solution providers and contractors that service both the federal government and military. And for very good reason. Evolving away from traditional forms of application development – such…
Four Best Practices for Securing Cloud-Native Applications
This article is part of a larger piece on cloud-native applications originally published on TechBeacon.com and featured on the Checkmarx blog. Click HERE to read the original in its entirety. Cloud-native has evolved from a marketing term into a highly…