Category: Red Hat Security

What’s new in post-quantum cryptography in RHEL 10.1

In May 2025, Red Hat Enterprise Linux 10 (RHEL) shipped with the first steps toward post-quantum cryptography (PQC) to protect against attacks by quantum computers, which will make attacks on existing classic cryptographic algorithms such as RSA and elliptic curves…

From if to how: A year of post-quantum reality

For the last 5 years, post-quantum cryptography (PQC) has largely been discussed as a research topic. It was a question of if—if the standards are ratified, if the algorithms perform, if the threat is real.In 2025, Red Hat changed the…

Red Hat Hybrid Cloud Console: Your questions answered

Managing a hybrid environment can feel like a balancing act between disparate sets of fragmented tools used for all the different platforms you interact with. If that sounds familiar, then your team needs integrated management across your diverse hybrid infrastructure.…

CIS publishes hardening guidance for Red Hat OpenShift Virtualization

The Center for Internet Security® (CIS®) has officially published guidance for hardening Red Hat OpenShift Virtualization.The official publication of the new CIS Benchmark® for Red Hat OpenShift Virtualization is an important development for organizations running traditional virtual machines (VMs) alongside…

Solving tool overload, one automation step at a time

Modern IT departments are wrestling with a sprawling array of automation and operations tools, often numbering in the dozens or even hundreds. This complexity makes efficient management and integration a significant obstacle, especially as organizations accelerate their investment in hybrid…