author:


Security

Why Investing in Software Security Is Worth It


Building IT software isn’t always the most secure process. The reason for this is simple economics. Companies can’t always afford to build in the security features software needs to be secure. Let’s walk through a typical IT software project. As the IT software project …


author:


DevOps

Getting Started With Hybrid IT


Over the past few weeks, I’ve written a lot about hybrid IT and its benefits. New tools, new technologies, new skillsets. Hybrid IT is still new to a lot of companies, and you might be wondering how to get started. Below are some areas …


author:


Security

Giving SIEM Tools a Role in Your IT Security Operations


While there is no one single solution to guard agencies against all cyberthreats, there are tools that can certainly go a long way toward managing and understanding the cyberthreat landscape. One such tool is Security Information and Event Management (SIEM) software. SIEM tools combine …


author:


Security

Information Security: Defense-in-Depth Style


Ladies and gentlemen, we’ve reached the fifth and final post of this information security in hybrid IT series. I hope you’ve found as much value in these posts as I have in your thoughtful comments. Thanks for following along. Let’s take a quick look back at …



author:


DevOps

Assessing Your Agency’s Cloud Readiness


A recent report regarding the modernization of Federal Information Technology (IT), coordinated by the American Technology Council (ATC) in 2017, called for agencies to “identify solutions to current barriers regarding agency cloud adoption.” Couple the report with the White House draft release of a …




author:


DevOps

How to Prevent Lock-In for DevOps Tooling


We’ve talked about a lot in this series about DevOps tooling: Start Your DevOps Journey by Looking at the Value You Add Why Choosing a One-Size-Fits-All Solution Won’t Work How to Choose the Right Tools in Your DevOps Toolchain How to Prevent Tool Sprawl …


author:


Security

Tips for Building a Battle-Hardened Network


The U.S. Army is leading the charge on the military’s multidomain battle concept—but will federal IT networks enable this initiative or inhibit it? The network is critical to the Army’s vision of combining the defense domains of land, air, sea, space and cyberspace to …