Four Usage Models of Confidential Computing

This is the third article in a series on confidential computing published originally on the Red Hat blog. To read the original in its entirety, click HERE. In the existing implementations (with the notable exception of Intel SGX), confidential computing is fundamentally…

The Need for Attestation In Confidential Computing

This is the second article in a series on confidential computing published originally on the Red Hat blog. To read the original in its entirety, click HERE. In a confidential computing environment, another form of proof called attestation becomes increasingly…

Public sector cloud migration strategies—How these help pave the way for successful IT modernization

From tech layoffs to hiring freezes, it’s no secret that the IT industry has been through a rollercoaster ride of changes these past few years. Recently, there’s been a broad-based misconception within the tech industry and across the public sector…

Three Key Findings from Red Hat’s 2023 State of Kubernetes Security Report

Earlier this month, Red Hat released its The State of Kubernetes Security for 2023 report. This annual report explores the specific security risks organizations face regarding cloud-native development, including risks to their software supply chain, and how they mitigate these risks…

An Open Source Solution to the Cycle of Veteran Suicide

This article was originally published on the Red Hat Blog. To read the original in its entirety, click HERE. In 2022, Red Hat teamed with global consulting services provider Guidehouse and Philip Held, Ph.D. of Rush University Medical Center, to…

Technology at the edge—How cloud computing has benefitted the DHS and DoD

Over the past two decades, cloud computing has exploded in popularity among businesses, organizations, agencies, and individuals. Today, the cloud is widely used across organizations and enterprises to make their IT architectures more scalable, and enable their organizations to provision…

Keeping the Lights on with Event-Driven Automation

This article originally appeared on the Red Hat Blog. To read the original in its entirety, click HERE. IT operations teams face challenges in Day 2 operations. But what are Day 2 operations? According to Red Hat’s Bill Cozens, “We talk…

Securing Your Open Source Software Supply Chain

This article originally appeared on the Red Hat blog. To read the original in its entirety, click HERE. As an engineer on the Supply Chain team, the more I dive into software development, the more I have come to understand…

The new face of military power—How AI & ML are improving drones

Unmanned aerial vehicles (UAVs) may seem like a new advancement on the battlefield, but today’s modern UAVs – or drones as they’re commonly known – are the evolution of a technology that was used in the Vietnam War. Back then,…

An Introduction to Hardening

This article is part of a series on STIGs that was originally featured on the Red Hat blog. To read this article – and the STIG series – in full, click HERE. Secure Technology Implementation Guides (STIGs) as a framework…

 

 

 

We launched GovDevSecOpsHub to focus on the next evolution of application development, DevSecOps, which brings cybersecurity teams and tools into the development process sooner so that applications are more secure and safeguarded against cyber threats.

In  GovDevSecOpsHub we’ll look at the evolution from traditional software and application development to the DevOps model. We’ll talk about the importance of moving from DevOps to DevSecOps. We’ll highlight the technologies and cultural changes necessary to make this shift happen. And we’ll profile government organizations and executives that are the “boots on the ground” as the government pivots towards the DevSecOps model.