How is Red Hat addressing the demand to develop offerings more securely?

The IT industry not only looked very different 20 years ago, product security looked very different as well. Open source software wasn’t mainstream and the majority of vendors had full control and secrecy over their product code.

This article has been indexed from Red Hat Security

Read the original article: