This article is part of a series on STIGs that was originally featured on the Red Hat blog. To read this article – and the STIG series – in full, click HERE. Secure Technology Implementation Guides (STIGs) as a framework…
Three Considerations for Choosing a Cloud Automation Technology
This article is part of a larger post that was originally featured on the Red Hat blog. To read the original in its entirety, click HERE. Large organizations are crossing a new threshold in their cloud adoption journey. Whether they…
How CISA and NIST are Helping Agencies Develop Secure Software
As modernization continues to sweep across the entire federal government, all agencies are experiencing an influx of new data and information that are becoming juicy targets for hackers to get their hands on. This is unfortunate timing, as cyber attackers…
The Challenges that Agile Creates in the Public Sector
In the last episode of the ContinuousX Podcast, hosts Rick Stewart and Michael Fitzurka sat down with Cliff Berg, one of the coauthors of “Agile 2: The Next Iteration of Agile,” about the unintended consequences of the Agile method of application…
The Unintended Consequences of Agile
When the Agile Manifesto and the Agile approach to development were introduced, they were intended to provide a new, more efficient approach to application development that expedited processes and resulted in better products. However, much like with any new technology,…
Not All Software Vulnerabilities are the Same…
This article was originally published on the Red Hat Blog. To read the original in its entirety, click HERE. Vulnerabilities in software are a global concern, and open source software is no different from proprietary software in this regard. Any…
DevSecOps as a Risk Management Strategy?
In the last episode of the ContinuousX Podcast, hosts Mike Fitzurka and Rick Stewart of TD SYNNEX Public Sector were joined by Cliff Berg, one of the coauthors of Agile 2: The Next Iteration of Agile, for a discussion about Agile…
Maximizing existing IT investments in times of uncertainty
This article is part of a longer piece originally published on the Red Hat blog. Click HERE to read the original in its entirety. We live in uncertain and unpredictable times. Business leaders may be tempted to batten down the…
Red Hat and IBM Launch Project Wisdom to Enable Enterprise IT Automation
As IT systems expand into heterogeneous environments, the complexity of managing workloads can be more than what human teams can handle. Automation tools are critical to maintain sprawling footprints at the necessary scale and help drive business initiatives. And while…
Agile 2 – A New Approach to Agile for a Modern World
The Agile Manifesto that was released in the early 2000s was a massive step in the right direction for helping to eliminate or streamline complicated, impractical, or otherwise inefficient software development processes. The Agile Manifesto included four values and twelve…