An Introduction to Hardening

This article is part of a series on STIGs that was originally featured on the Red Hat blog. To read this article – and the STIG series – in full, click HERE. Secure Technology Implementation Guides (STIGs) as a framework…

Three Considerations for Choosing a Cloud Automation Technology

This article is part of a larger post that was originally featured on the Red Hat blog. To read the original in its entirety, click HERE. Large organizations are crossing a new threshold in their cloud adoption journey. Whether they…

How CISA and NIST are Helping Agencies Develop Secure Software

As modernization continues to sweep across the entire federal government, all agencies are experiencing an influx of new data and information that are becoming juicy targets for hackers to get their hands on. This is unfortunate timing, as cyber attackers…

The Challenges that Agile Creates in the Public Sector

In the last episode of the ContinuousX Podcast, hosts Rick Stewart and Michael Fitzurka sat down with Cliff Berg, one of the coauthors of “Agile 2: The Next Iteration of Agile,” about the unintended consequences of the Agile method of application…

The Unintended Consequences of Agile

When the Agile Manifesto and the Agile approach to development were introduced, they were intended to provide a new, more efficient approach to application development that expedited processes and resulted in better products. However, much like with any new technology,…

Not All Software Vulnerabilities are the Same…

This article was originally published on the Red Hat Blog. To read the original in its entirety, click HERE. Vulnerabilities in software are a global concern, and open source software is no different from proprietary software in this regard. Any…

DevSecOps as a Risk Management Strategy?

In the last episode of the ContinuousX Podcast, hosts Mike Fitzurka and Rick Stewart of TD SYNNEX Public Sector were joined by Cliff Berg, one of the coauthors of Agile 2: The Next Iteration of Agile, for a discussion about Agile…

Maximizing existing IT investments in times of uncertainty

This article is part of a longer piece originally published on the Red Hat blog. Click HERE to read the original in its entirety. We live in uncertain and unpredictable times. Business leaders may be tempted to batten down the…

Red Hat and IBM Launch Project Wisdom to Enable Enterprise IT Automation

As IT systems expand into heterogeneous environments, the complexity of managing workloads can be more than what human teams can handle. Automation tools are critical to maintain sprawling footprints at the necessary scale and help drive business initiatives. And while…

Agile 2 – A New Approach to Agile for a Modern World

The Agile Manifesto that was released in the early 2000s was a massive step in the right direction for helping to eliminate or streamline complicated, impractical, or otherwise inefficient software development processes. The Agile Manifesto included four values and twelve…

 

 

 

We launched GovDevSecOpsHub to focus on the next evolution of application development, DevSecOps, which brings cybersecurity teams and tools into the development process sooner so that applications are more secure and safeguarded against cyber threats.

In  GovDevSecOpsHub we’ll look at the evolution from traditional software and application development to the DevOps model. We’ll talk about the importance of moving from DevOps to DevSecOps. We’ll highlight the technologies and cultural changes necessary to make this shift happen. And we’ll profile government organizations and executives that are the “boots on the ground” as the government pivots towards the DevSecOps model.