Zero-Trust Security: What Architects Need To Know
Implementing zero trust may seem daunting, but it is also an opportunity to integrate more secure coding practices into your software applications from the start. Zero-trust security assumes that all traffic on your internal network is potentially malicious. Consequently, it requires taking measures to:
Develop Cloud Native Applications Faster with D2iQ and AWS
In this post we will look at how to accelerate the development of cloud native applications, give you a snapshot of the USAF deployment of D2iQ, and provide a link to the DLT Cloud Security Assessment to see where you currently stand.
3 DoD Software Modernization Priorities You Need to Know About
"We are making progress. This really is not just about technology. This is about changing our processes changing our approach to delivering and operating technology to IT systems and our cyber mechanical warfare systems as we move forward," said Robert Vietmeyer, DoD Director for Cloud and Software Modernization.
IBM Named a Leader in the 2021 Gartner® Magic Quadrant™ for Cloud Database Management Systems
- Read more about IBM Named a Leader in the 2021 Gartner® Magic Quadrant™ for Cloud Database Management Systems
For the second year in a row, Gartner named IBM a Leader in Gartner Magic Quadrant for 2021 Cloud Database Management Systems based on its Ability to Execute and Completeness of Vision. With emergence of a single cloud DBMS market, We believe our portfolio of feature-rich, enterprise-tested offerings, bold acquisitions, and partnerships enable our clients to address the unique needs of their business, respond to the growing volume, velocity and variety of today’s data and drive more accurate data driven decisions.
The IBM Center Weekly Roundup - Business of Government Hour
This week's roundup of the latest news and insights gathered from IBM's Government Research Institute thought leaders:
Tech Transforms podcast: Web 3.0, Gamification, CIA Innovation, Getting Ahead of the Adversary
- Read more about Tech Transforms podcast: Web 3.0, Gamification, CIA Innovation, Getting Ahead of the Adversary
On the Tech Transforms podcast, sponsored by Dynatrace, we have talked to some of the most prominent influencers shaping critical government technology decisions. From supply chain to machine learning, this podcast explores the way technology advancement intersects with human needs.
In March 2022, we sat down with these government technology visionaries:
The U.S. Department of the Navy’s Approach to Zero Trust: Key Takeaways From the 2022 DON IT Conference
- Read more about The U.S. Department of the Navy’s Approach to Zero Trust: Key Takeaways From the 2022 DON IT Conference
"Zero Trust is a cybersecurity strategy and framework that embeds IT security mechanisms throughout an architecture that generate metadata used to secure, manage, and monitor every device user, application, and network transaction at the perimeter and within every network enclave."
From the Department of Defense (DoD) Zero Trust Reference Architecture v1.0
IaC – A Potential Source of Vulnerabilities, or an Opportunity for More Secure Infrastructure?
- Read more about IaC – A Potential Source of Vulnerabilities, or an Opportunity for More Secure Infrastructure?
Last month, ICIT sponsored an online panel discussion featuring a number of application development and cybersecurity experts from across industry, the federal government, and the Department of Defense. This panel discussion focused on two new security vectors that have arisen as application development practices and technologies have evolved – infrastructure as code (IaC) and APIs.
Five Reasons Why Agencies are Choosing SAST Over WAF
Article originally posted by the GovDevSecOpsHub here.
Today’s Application Security (AppSec) measures focus on protecting web applications. These measures include methods of preventing data or code within the application from being compromised or hijacked. AppSec is an essential part of the Software Development Life Cycle (SDLC) and ensuring that applications are secured must be a top priority in today’s ever-evolving and expanding digital landscape.
Six Ways AST Keeps Digital Citizen Services Secure
Article originally posted to the GovDevSecOpsHub here.
When in-person processes became impossible during the pandemic, the extent to which public sector services relied on them became apparent. Town halls, municipal offices, schools, and colleges were forced to close their doors to the public, and the need to provide digital alternatives to citizen services so that constituents could continue to access them became clear.