The Benefits of Open Source Edge Solutions in Rail Transportation 

This article was originally featured on the Red Hat blog. You can read the original in its entirety by clicking HERE. Railway systems have been around for centuries and serve as a highly cost-effective method for freight delivery and rail…

6 Security Tips for Open Source Developers

For many, writing a computer program isn’t that hard—it simply requires a certain amount of structural and logical thinking and a clear understanding of the syntax of the language you are using. Developing software with a greater security posture adds an…

Five government trends from Red Hat’s State of Enterprise Open Source report

This article was originally published on the Red Hat Blog. Click here to read the original article in its entirety. An examination of government sector data from Red Hat’s fourth annual The State of Enterprise Open Source report – which included responses…

Survey Shows IT Leaders Think Open Source as Secure as Proprietary Software

Each year, Red Hat surveys IT decision-makers about the state of enterprise open source. And the company surprisingly encounters one or two results that it didn’t expect in the survey results, despite its thousands of interactions with IT professionals throughout…

Four AppSec Threats Facing Healthcare Organizations

The industries and organizations that many perceive to have the highest cybersecurity risk are often the “usual suspects.” They include financial services and technology – industries that have a lot of resources, or proprietary, high-value data that can make a…

Digital Transformation and the Revolutionary Power of Data on Display at the 2021 Red Hat Government Symposium

On November 16, 2021, Red Hat will be sponsoring its annual Red Hat Government Symposium, which promises to bring together, “top IT leaders from federal, state, and local agencies, as well as industry partners and Red Hat experts,” to discuss…

Combating State and Local Cyberthreats with a Centralized Approach to AppSec

This article was originally featured on the Checkmarx blog. Click HERE to read the original in its entirety. Within state and local governments across the US, citizens using online services can pay taxes and fees, register for libraries, register to…

Five Factors to Look for in an Application Security Solution

This article was originally published on the Checkmarx blog. To read the original in its entirety, click HERE. The process of writing code (and the code itself) has changed dramatically: functionality and end-goals for code execution are lightyears ahead of…

Managing the Risks of Open Source Code

Most organizations with in-house development teams maintain their own code bases. Their developers write most of the code for those codebases themselves. However, they may choose to add third-party open source code to their codebases, for several reasons. The most…

 

 

 

We launched GovDevSecOpsHub to focus on the next evolution of application development, DevSecOps, which brings cybersecurity teams and tools into the development process sooner so that applications are more secure and safeguarded against cyber threats.

In  GovDevSecOpsHub we’ll look at the evolution from traditional software and application development to the DevOps model. We’ll talk about the importance of moving from DevOps to DevSecOps. We’ll highlight the technologies and cultural changes necessary to make this shift happen. And we’ll profile government organizations and executives that are the “boots on the ground” as the government pivots towards the DevSecOps model.