Security as Code — Making Application Development Faster and Safer

Right in the middle of the holiday season, as much of the world was preparing to take some deserved time off to celebrate with their families and bid 2020 a less-than-fond farewell, some terrible news broke involving a number of…

Five Common Encryption Key Management Challenges

The “security by obscurity” obfuscation method involves concealing details of encryption algorithms to make them harder for threat actors to crack, but it often relies on the use of weak cryptography. Once the secrets of the algorithm’s implementation are discovered…

Better, Faster, Safer – Improving App Development and Security with OpenShift

As software takes on an increasingly essential and mission-critical role in the operations of the U.S. government and Department of Defense (DoD), application developers creating software on behalf of the government are under pressure to develop and deploy new versions,…

Closing the Gaps in Disk Encryption with Application-Layer Encryption

This article was originally featured on the Ubiq blog. To read the original in its entirety, click HERE. As cliché as it sounds, data is a company’s most valuable commodity and cyber threat actors are taking increasingly drastic steps to…

Four Key Application Security Benefits of DevSecOps

Data breaches occur so frequently that it wouldn’t be surprising if the average American is becoming desensitized to them. It would be even less surprising if they’ve failed to notice that breaches are happening more frequently as cyberattacks increase in…

Why a new approach to encryption is essential for today’s government applications

Over the past decade, the role of software in the federal government has evolved from something that increased operational efficiency or made life easier, to completely mission-critical to agencies and military organizations. Software is key to federal digital transformation initiatives,…

 

 

 

We launched GovDevSecOpsHub to focus on the next evolution of application development, DevSecOps, which brings cybersecurity teams and tools into the development process sooner so that applications are more secure and safeguarded against cyber threats.

In  GovDevSecOpsHub we’ll look at the evolution from traditional software and application development to the DevOps model. We’ll talk about the importance of moving from DevOps to DevSecOps. We’ll highlight the technologies and cultural changes necessary to make this shift happen. And we’ll profile government organizations and executives that are the “boots on the ground” as the government pivots towards the DevSecOps model.