Security
Headlines
HeadlinesLatestCVEs

Source

Red Hat Blog

The State of Kubernetes Security in 2022

Kubernetes is the de facto standard when it comes to container orchestration and management at scale, but adoption is only one piece of Kubernetes strategy. Security plays a huge role in how organizations use cloud-native technologies, and is typically much trickier to address than simply spinning up and running containers.

Red Hat Blog
#red_hat#kubernetes
Managing Red Hat Enterprise Linux at the edge

Are your edge computing systems secure? A simple question with a potentially complicated answer. This is because many engineering teams combine Red Hat Enterprise Linux with decoupled applications thanks to containerization technologies. But with so many changes happening across your organization, it can be hard to scale your infrastructure.

Security recommendations for SAP HANA on RHEL

After extensive testing on RHEL 8.2, 8.4, 8.6 and 9 using the SAP HANA validation test suite, Red Hat’s engineering team concluded that SELinux can run in Enforcing mode with minimal impact to database performance. This is important because it means that RHEL customers will be able to apply higher security levels to their hosts running SAP HANA and tailor the policies to their needs.

Compliance as Code: Extending compliance automation for process improvement

Supply chain disruptions, intellectual property theft and the rising cost of data breaches are among the top reasons for a drastic increase in global focus on cybersecurity compliance.

OpenSSH SCP deprecation in RHEL 9: What you need to know

One of the most important security changes for OpenSSH in Red Hat Enterprise Linux (RHEL) 9 is the deprecation of the SCP protocol. These are the changes that we have implemented: The scp command line tool uses the SFTP protocol for file transfers by default.

5G edge and security deployment evolution, trends and insights

A recent survey provides insight into how 5G networks may evolve as operators and the wider mobile ecosystem continue to invest in 5G technology. This article discusses some of the findings for 5G and edge computing, and concludes with a perspective centered around 5G security.

5 security considerations for edge implementations

Many organizations are apprehensive about the security of edge deployments. As data becomes more and more valuable, security threats create increasingly serious concerns. No organization wants to be in the news explaining why they were exposed to the latest security threat, nor do they want to account for sensitive information being stolen. These security threats can damage an organization's credibility and ultimately impact their bottom line.

Regulatory compliance at scale with Red Hat Insights

How do you determine if your Red Hat Enterprise Linux (RHEL) infrastructure is compliant with security standards? This post will walk through how Red Hat Insights can help you apply security compliance policies against multiple RHEL hosts, improve the accuracy of your security posture, and more.

Improve your hybrid cloud security with these 3 tips

No matter where you are in your hybrid cloud journey, security is a primary concern. In this post, we'll look at tips and products that can help with deploying a security-focused hybrid cloud.

Results that surprised us in The State of Enterprise Open Source report

We surveyed nearly 1,300 IT decision makers at medium to large enterprises worldwide about the state of enterprise open source. Learn more about some of the key takeaways.