Read the original article: 2021 Global Tech Outlook, A Red Hat Report: Digital transformation, security and hybrid cloud use stand out When we surveyed IT leaders this year to learn about their technology goals for 2021, we were curious about…
Tag: Red Hat Security
2021 Global Tech Outlook, A Red Hat Report: Digital transformation, security and hybrid cloud use stand out
Read the original article: 2021 Global Tech Outlook, A Red Hat Report: Digital transformation, security and hybrid cloud use stand out When we surveyed IT leaders this year to learn about their technology goals for 2021, we were curious about…
How security and compliance automation can help achieve a more secure hybrid cloud
Read the original article: How security and compliance automation can help achieve a more secure hybrid cloud In hybrid cloud environments, where workloads are deployed in physical hosts, virtual machines and containers across on-premise and cloud environments, security becomes more…
A guide to security technologies in Red Hat Enterprise Linux
Read the original article: A guide to security technologies in Red Hat Enterprise Linux Red Hat has a long history of adopting and creating security technologies to harden our core platforms, such as Red Hat Enterprise Linux (RHEL). When other…
You call that DevSecOps? Why your DevSecOps practice may be falling short
Read the original article: You call that DevSecOps? Why your DevSecOps practice may be falling short The current state of application development is interesting and also troublesome. Modern and cloud scale app dev has adopted DevOps, where the tools are…
Enhancing internet and cloud security with Red Hat's contribution the Guide to IPsec VPNs
Read the original article: Enhancing internet and cloud security with Red Hat's contribution the Guide to IPsec VPNs Virtual private network (VPN) technology has changed immensely since the publication of the original Guide to IPsec VPNs (SP 800-77) in 2005.…
USBGuard improvements in Red Hat Enterprise Linux 8.3
Read the original article: USBGuard improvements in Red Hat Enterprise Linux 8.3 USBGuard is a software framework that helps protect your systems against rogue USB devices (a.k.a. BadUSB) by implementing basic allowlisting and blocklisting capabilities. This allows you to define access…
Security flaws and CVSS rescore process with NVD
Read the original article: Security flaws and CVSS rescore process with NVD Red Hat Product Security rates the severity of security issues found in Red Hat products using a four-point scale: Low, Moderate, Important, and Critical, as well as includes…
Security flaws and CVSS rescore process with NVD
Read the original article: Security flaws and CVSS rescore process with NVD Red Hat Product Security rates the severity of security issues found in Red Hat products using a four-point scale: Low, Moderate, Important, and Critical, as well as includes…
Red Hat adopts ROLIE protocol for automated exchange of security compliance assets
Read the original article: Red Hat adopts ROLIE protocol for automated exchange of security compliance assets This is a primer on the implementation of the ROLIE protocol. The purpose of this report is to recommend automated processes for information exchange…
Managing the security of your Red Hat Enterprise Linux environment with Red Hat Insights
Read the original article: Managing the security of your Red Hat Enterprise Linux environment with Red Hat Insights When it comes to managing security risks, enterprises face an increasing number of challenges. One of these challenges is managing the security…