FEATURED POSTS

DevSecFinOps? Introducing FinOps in the Public Sector
We all know what the different parts of DevSecOps stand for and why there has…

The Need for Attestation In Confidential Computing
This is the second article in a series on confidential computing published originally on the…

An Introduction to Confidential Computing
This is the first article in a six-part series on Confidential Computing being featured on…

Public sector cloud migration strategies—How these help pave the way for successful IT modernization
From tech layoffs to hiring freezes, it’s no secret that the IT industry has been…

Three Key Findings from Red Hat’s 2023 State of Kubernetes Security Report
Earlier this month, Red Hat released its The State of Kubernetes Security for 2023 report. This…

DevSecOps is NOT About Security
Click-bait aside…I am tired of seeing articles and presentations about DevSecOps only to find out…

Exploring the Cyber Risks of Microservices
As the need to develop applications more quickly – at the pace of innovation –…

An Open Source Solution to the Cycle of Veteran Suicide
This article was originally published on the Red Hat Blog. To read the original in…

Technology at the edge—How cloud computing has benefitted the DHS and DoD
Over the past two decades, cloud computing has exploded in popularity among businesses, organizations, agencies,…

Everything-As-Code Everywhere All at Once
As software and applications have become more mission-critical across the government, the need to develop…