City of Frisco Modernizes its Technology Landscape to Drive Collaboration

It’s not easy managing the evolving technology needs of one of the fastest-growing cities in the United States. But over the past decade, the City of Frisco, Texas, has transformed its digital approach from a disjointed set of products to…

PODCAST: AST, DevSecOps and Developer Training – Three Essential AppSec Tools

Massive cyberattacks and breaches that originated in applications, including the recent SolarWinds breach that impacted as many as ten government agencies, and the more recent Kaseya breach which may have impacted hundreds of companies, have rightfully raised questions about application…

Six Reasons Why Getting Actionable Insights From Log Data is Impossible

This article is part of a larger piece that was originally published on the Dynatrace blog. Click HERE to read the original in its entirety. Leveraging cloud-native technologies like Kubernetes or Red Hat OpenShift in multicloud ecosystems across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud…

Three-Step Threat Modeling Process for More Secure Services

This article was originally written by Robert Reichel for the GitHub blog. To see the original article in its entirety, click HERE. One of the most effective tools for DevOps teams looking to increase the security of their applications is…

 

 

 

We launched GovDevSecOpsHub to focus on the next evolution of application development, DevSecOps, which brings cybersecurity teams and tools into the development process sooner so that applications are more secure and safeguarded against cyber threats.

In  GovDevSecOpsHub we’ll look at the evolution from traditional software and application development to the DevOps model. We’ll talk about the importance of moving from DevOps to DevSecOps. We’ll highlight the technologies and cultural changes necessary to make this shift happen. And we’ll profile government organizations and executives that are the “boots on the ground” as the government pivots towards the DevSecOps model.