Explore the benefits of testing Ansible content within Red Hat OpenShift Dev Spaces.
This article demonstrates how to install Ansible lint and provides examples of how it improves playbook debugging and saves time.
Discover more about Red Hat Trusted Application Pipeline, a secure and easy solution for the DevSecOps outer loop.
This article demonstrates how to install MSSQL using Ansible Vault, an Ansible Automation Platform feature, to protect sensitive information.
Learn how the FORTIFY_SOURCE feature in the GNU C library improves C code security by detecting and preventing buffer overflow, and more.
Learn how to deploy single sign-on as code using GitOps in this demonstration.
Learn about OS command injection attacks and 4 essential best practices to prevent them.
Discover how to improve application and library security at the source with _FORTIFY_SOURCE macro defined to 3 and how it impacts performance.
Valgrind can be used to track file descriptors. Learn how to find file descriptors at various stages of your program and where they were originally opened.
Learn techniques to secure applications and prevent break-ins and data theft.
Discover why the Linux kernel returns an errno code using SystemTap and how to use the whythefail.stp script in this demonstration.
Learn about static application security testing (SAST) and how it improves software security.
Discover key elements of building security into your software development process such as managing access in part 9 of the Node.js reference architecture series.
Service bindings, the kube-service-bindings npm package, and the Red Hat OpenShift UI make it easier to connect securely to a database on Kubernetes.
Most Linux kernel testing happens from userspace and can be done using simple commands for system calls, logging, and more.
Learn to use Git's clean/smudge filter to secure secret data like tokens, private server addresses, and PII when working on public Git repositories.
Learn what DevSecOps is, why it matters, and how to start using it to create secure code at the beginning of your projects with this guide from Red Hat.
Follow this step-by-step guide to create secure deployments in Red Hat services using entitlements, certificate authority, configuration files, and BuildConfig.
Find out what debugging information is, where it's stored, and how to inspect it. This article is the second of a three-part series about using GNU Debugger.
Visual Code is an easy way to debug .NET applications in cloud environments like Kubernetes and OpenShift. Learn which plug-ins and configurations you need.
A simple tool called invectio, from Project Thoth, uses static source code analysis to display the symbols used or exported by Python source code.
Customize Python dependency resolution with Project Thoth, a cloud service based on reinforcement learning. Use its pluggable interface to make adjustments.
An intelligent, distributed caching solution that boosts application performance, provides greater deployment flexibility, and minimizes the overhead of standing up new applications.
Discover little-known Valgrind and GDB commands that can help you resolve memory leaks, buffer overflows, and similar bugs in your C and C++ code.
Learn how Project Thoth's new security recommender makes a recommendation, then use the Thamos CLI to find security issues in your Python library code.