Security
Headlines
HeadlinesLatestCVEs

Source

Red Hat Blog

Cryptographic signatures for zip distributions

Red Hat's products are distributed through numerous methods, including RPMs, ISOs and zip files. Over the past several months, we have been working across the organization to design and implement a plan to provide signatures for all zip file types so that our customers have greater assurance that Red Hat actually creates the products they receive. This work is essential to our customers' trust in Red Hat and our products.

Red Hat Blog
#web#mac#linux#red_hat#git#auth#rpm
Service Preview of Red Hat Advanced Cluster Security Cloud Service

Container and Kubernetes adoption brings the promise of faster application development and delivery at larger scales -- however, it also brings with it new security challenges. Protecting cloud-native applications can require significant changes in how organizations approach IT security. They need to apply controls earlier in the application development lifecycle, use existing infrastructure to apply and enforce these controls, keep up with increasingly rapid release schedules, and more.

Red Hat OpenShift security portfolio grows with new Red Hat Insights Vulnerability service

Red Hat Insights, which is included with Red Hat subscriptions, analyzes platforms and applications to help enterprises manage hybrid cloud environments. Insights uses predictive analytics and deep domain expertise to reduce complex operational tasks from hours to minutes, including identifying security and performance risks, tracking licenses and managing costs.

What is the Confidential Containers project?

Confidential Containers (CoCo) is a new sandbox project of the Cloud Native Computing Foundation (CNCF) that enables cloud-native confidential computing by taking advantage of a variety of hardware platforms and technologies.

Open source incident response solutions

Red Hat leads the tech industry's cutting edge practices for the resolution of cybersecurity issues. Red Hat does this by providing relevant and accessible information and enabling the larger community to make well-informed decisions about security issues.

Connecting to the RHEL web console, part 2: Running the Cockpit web server

The Red Hat Enterprise Linux (RHEL) web console provides a web-based graphical interface for managing and monitoring systems. The web console can be used to complete a wide variety of tasks, such as managing storage, users, the firewall, monitoring performance metrics, reviewing log files, installing system updates and many others.

Red Hat Shares ― Edge computing: Security

The Red Hat Shares newsletter helps IT leaders navigate the complicated world of IT―the open source way.

Edge solutions in rail transportation deliver efficiencies, security and flexibility with open source solutions

Railway systems have been around for centuries and serve as a highly cost-effective method for freight delivery and rail is growing in popularity among passengers. Rail systems with a significant legacy operational technology (OT) footprint are just embarking on the digital transformation journey.

How to integrate Red Hat Advanced Cluster Security for Kubernetes with ServiceNow

In this post I will go through how you can integrate and send policy alert notifications from Red Hat Advanced Cluster Security for Kubernetes (RHACS) to ServiceNow.

Connecting to the RHEL web console, part 1: SSH access methods

There are two primary methods available to remotely manage and administer a Red Hat Enterprise Linux (RHEL) system: the command line interface over an SSH connection and the RHEL web console.