Hubbard Radio Washington DC, LLC. All rights reserved. This website is not intended for users located within the European Economic Area.
It’s not enough to support an application after its release to keep it secure. Security must be top of mind throughout an application’s development. That is core to the model of DevSecOps.
Read moreThe Federal Aviation Administration has more than 700 applications that support its mission, from human resources and finance to aircraft safety, and it’s been working to leverage DevSecOps for those applications.
NASA runs on software, as do many federal agencies. Rockets are what they are known for, sure, but controlling them and interpreting data, even handling human resources and finances all require software. Currently, NASA is in development of over 1,000 software features leveraging agile.
Federal agencies – along with most large organizations – are steadily moving to a new generation of technology in the deployment of software applications. Regular run-time code gave way to virtual machines, and now virtual is yielding to containerization managed under frameworks like Kubernetes. This methodology brings a new set of cybersecurity risks IT staffs must mitigate.
As agencies continue to implement the customer experience executive order, they will increasingly need to modernize legacy systems so they are flexible enough to meet changing user needs.
Federal experts praised Rep. Nancy Mace (R-S.C.) for past legislative bipartisan efforts around quantum computing and federal cyber workforce.
In order to know whether they get a fair price for something, the armed forces need to know the cost of making it. That’s where the cost estimating and discovery part of acquisition comes in.
OPM also wants to update several vetting factors to make it harder for domestic extremists to find employment in the government.
A bill before the House would create a new cadre of people to help the government in case of a serious cyber attack. The National Digital Reserve Corps would be managed by the General Services Administration.
Raj Iyer’s last day as the Army’s chief information officer is Feb. 10, after which he plans to return to industry but continue to support the service’s transformation efforts.
Login problems and re-ticketing show up among issues with IT user experience at DoD according to a survey from the Defense Business Board.
Cybersecurity in the private sector has long been a matter of collaboration. Companies and sectors worked with government to establish risk management approaches to what companies would ultimately decide to do. Our next guest believes that statements coming from the administration signal a move to cyber regulations, mandates and oversight.