Software Security for Developers
Improve your application's security and close vulnerabilities with improved tooling and processes.
Application Security Posts
Learn how you can implement secure GitOps practices for developer teams by setting up control planes with the Red Hat OpenShift GitOps operator.
Find out what's new in Red Hat Integration Service Registry 2.0, then use the new single sign-on feature to secure your registry using OpenID Connect.
Use the annocheck stack clash scanner to build a custom scanning tool that you can use to search for a variety of instruction sequences inside executable files.
Explore three source-level annotations that you can use to help detect out-of-bounds accesses across function call boundaries in GCC 11.
Get started with Authorino, a proxy-based security tool that provides flexible, Zero Trust API protection based on a range of authentication and authorization models, mechanisms, and policies.
Use the performance benchmarks in this article to better estimate the size of your projects and acquire the right number of subscriptions for Red Hat's single sign-on technology.