Digital transformation driving cyber challenges – How modernization initiatives are creating risk in the public sector

2022 was an incredible year for the adoption of advanced technologies and modernization within the federal government and the U.S. military. But, while significant strides have been made in government digital transformation and modernization initiatives since the early days of…

The current state of government AppSec and the threats agency developers face

For IT professionals who develop the technologies, applications, and services that federal, state, and local government agencies employ, there is one specific challenge that they always find themselves brushing up against. When government agencies request new applications and expect them…

Bolstering Application Security with Identity Governance

At its core, application onboarding is the use of software that can manage, and grant users access to applications as long as they have the proper permission and roles. More importantly, this puts applications under the jurisdiction of an identity…

Cloud Navigator – Charting a Course to More Secure IT Solutions

This article was originally published on GovDevSecOpsHub, that article can be found here. Today it is quite uncontroversial to say that the cloud is here and that it is not going anywhere anytime soon. Two years ago, this was a…

More scalable AND secure –Brian Schoepfle of AWS on the security benefits of government cloud initiatives

In 2011, the Office of Management and Budget (OMB) released the Federal Cloud Computing Strategy, also known as “Cloud First.” The purpose of Cloud First was to mandate the Federal Government’s transition to the cloud, which would facilitate the modernization…

APIs and IaC – Two New AppSec Imperatives for Development and Security Teams

Application vulnerabilities are among the largest, most exploited vulnerabilities that hackers use to compromise and breach organizations. With applications becoming more prevalent and relied upon, the need to focus on application security becomes absolutely essential. But what many people don’t…

The uphill climb of rebuilding America’s cyber workforce

President Biden has proposed injecting up to $9 billion to help bolster the Technology Modernization Fund.  What should this $9 billion be used on? Where could it be most effectively utilized to secure our nation, and what is the current…

How Application-Layer Encryption Closes the Gaps in Disk Encryption

This article was originally featured on the Ubiq blog. To read the original in its entirety, click HERE. As cliché as it sounds, data is a company’s most valuable commodity and cyber threat actors are taking increasingly drastic steps to…

Five Reasons to Prioritize AppSec in Your Agency

This article was originally published on the Checkmarx blog. Click HERE to see the original article in its entirety. These days, technology is evolving at a pace like never before seen, forcing organizations into an “adapt or die” situation. And,…

Four Ways DevSecOps Improves Application Security

Data breaches occur so frequently that it wouldn’t be surprising if the average American is becoming desensitized to them. It would be even less surprising if they’ve failed to notice that breaches are happening more frequently as cyberattacks increase in…