Security
Headlines
HeadlinesLatestCVEs

Source

Red Hat Blog

Red Hat OpenShift sandboxed containers: Peer-pods hands-on

<p>In this blog post, we’ll be going through deploying peer-pods on an OpenShift cluster running in AWS or vSphere cloud infrastructure. We will present how to create the virtual machine (VM) image for your peer-pod and demonstrate how to run workload in a peer-pod. The post assumes familiarity with Red Hat OpenShift and the cloud-provider which is in use.</p> <p>Peer-pods is an extension of <a href="https://www.redhat.com/en/blog/openshift-sandboxed-containers">OpenShift sandboxed containers</a>, and

Red Hat Blog
#web#ios#mac#amazon#ubuntu#linux#red_hat#js#git#kubernetes#vmware#aws#bios#asus#auth#docker#ssl
Red Hat OpenShift sandboxed containers: Peer-pods technical deep dive

<p>In our <a href="https://www.redhat.com/en/blog/red-hat-openshift-sandboxed-containers-peer-pods-solution-overview">first blog post</a>, we highlighted the peer-pods solution and its ability to bring the benefits of <a href="https://www.redhat.com/en/blog/openshift-sandboxed-containers">Red Hat OpenShift sandboxed containers</a> to any environment including the cloud and third-party hypervisors. In this post, we will delve deeper into the various components that make up the peer-pods sol

Red Hat OpenShift sandboxed containers: Peer-pods solution overview

<p>In this blog series, we will introduce the <a href="https://www.redhat.com/en/blog/learn-openshift-sandboxed-containers">Red Hat OpenShift sandboxed containers</a> <strong>peer-pods feature</strong>, which will be released as a <strong>dev-preview</strong> feature in <a href="https://www.redhat.com/en/technologies/cloud-computing/openshift/container-platform">Red Hat OpenShift</a> 4.12.&nbsp;</p> <p&

CSAF VEX documents now generally available

<p>In June 2022, we started <a href="https://www.redhat.com/en/blog/common-security-advisory-framework-csaf-beta-files-now-available">publishing CSAF advisory files</a> in their beta format, hoping to gather feedback from customers, partners, and the security community. With your inputs we worked on improving the final version of the files and they are now ready for public consumption in production use cases at <a href="https://access.redhat.com/security/data/csaf/v2/advisories/">https://access.redhat.c

Beyond the STIG: What hardening really means

<p><em>This is the second of a series that examines IT security and cybersecurity practices beyond Secure Technology Implementation Guides (STIGs). Read the intro post <a href="https://www.redhat.com/en/blog/beyond-stig-wider-world-cybersecurity">here</a>.</em></p> <p>“Hardening,” as a software concept, is a common term but what the practice actually entails and why it matters for contemporary IT organizations is not often explored. Hardening is crucial for every organizat

Data Privacy Day, every day

<p>As the leader of a global privacy team, I promote privacy best practices every day, and I always welcome the opportunity to talk about the importance of privacy to individuals and organizations. Did you know that January 28 is <a href="https://en.wikipedia.org/wiki/Data_Privacy_Day">Data Privacy Day</a>? The annual celebration is becoming more popular and helps serve as a reminder that privacy matters each and every day.</p> <p>Everyone has a role to play when it comes to privacy because everyone has

How to use Red Hat Insights malware detection service

<p>Did you know that <strong><a href="https://www.redhat.com/en/technologies/management/insights">Red Hat Insights</a></strong> for <strong><a href="https://www.redhat.com/en/technologies/linux-platforms/enterprise-linux">Red Hat Enterprise Linux</a></strong> (RHEL) can be used to help detect the presence of malware? This makes it more likely that you'll know when a RHEL system has sustained a malware attack. The effectivenes

Taking patch management to the next level with automation

<h3>Implementing the CISA known exploited vulnerability mandate with greater ease</h3> <p><br /> <img alt="" height="229" src="https://lh4.googleusercontent.com/xGj9oBUjSLNwwGwJq9ZIrzXXkhqhmFUFuEzmO7_Zu1zGXT8_s8vBfnXCOE8arv0FJIDYRQJ9wdjymsY1mmzIWsuhELntj4oY1QdPY1FzL0xrnB56jMVXmw80nbXALoHtq3Z5ngkuBsOyjDt3820LNrtKXkvjUM5LW5tjPVQYbIvt_1ZROpZX0BAdqEFyNQ" width="357" /></p> <p><em>Source: <a href=&qu

New deep threat intelligence in Red Hat Insights: Helping to prioritize what matters the most with system vulnerabilities

<p><strong><a href="https://www.redhat.com/en/technologies/management/insights">Red Hat Insights</a></strong> has added new functionality that helps users determine which of their registered <a href="https://www.redhat.com/en/technologies/linux-platforms/enterprise-linux">Red Hat Enterprise Linux</a> systems are "affected" with a vulnerability but are not “vulnerable.” Yes, “affected but not vulnerable” is a thing, and having this level

A Brief History of Cryptography

<p>Cryptology is a young science.</p> <p>Though it has been used for thousands of years to hide secret messages, systematic study of cryptology as a science (and perhaps an art) just started around one hundred years ago.</p> <p>The first known evidence of the use of cryptography (in some form) was found in an inscription carved around 1900 BC, in the main chamber of the tomb of the nobleman <a href="https://en.wikipedia.org/wiki/Khnumhotep_II">Khnumhotep II</a>, in Egypt. T