Software Security for Developers

Improve your application's security and close vulnerabilities with improved tooling and processes. 

Application Security Posts

Featured image for GitOps + Kubernetes

Managing GitOps control planes for secure GitOps practices

Chetan Banavikalmutt, Shubham Agarwal
August 3, 2021

Learn how you can implement secure GitOps practices for developer teams by setting up control planes with the Red Hat OpenShift GitOps operator.

Featured image for Apache Kafka.
How To

How to secure Apache Kafka schemas with Red Hat Integration Service Registry 2.0

July 16, 2021

Find out what's new in Red Hat Integration Service Registry 2.0, then use the new single sign-on feature to secure your registry using OpenID Connect.

Feature image for secure coding.

Build your own tool to search for code sequences in binary files

July 15, 2021

Use the annocheck stack clash scanner to build a custom scanning tool that you can use to search for a variety of instruction sequences inside executable files.

Featured image for: Value range propagation in GCC with Project Ranger.

Use source-level annotations to help GCC detect buffer overflows

June 25, 2021

Explore three source-level annotations that you can use to help detect out-of-bounds accesses across function call boundaries in GCC 11.

Featured image for secure coding.

Authorino: Making open source, cloud-native API security simple and flexible

June 18, 2021

Get started with Authorino, a proxy-based security tool that provides flexible, Zero Trust API protection based on a range of authentication and authorization models, mechanisms, and policies.

Featured image for Red Hat's single-sign on technology

How to size your projects for Red Hat's single sign-on technology

June 7, 2021

Use the performance benchmarks in this article to better estimate the size of your projects and acquire the right number of subscriptions for Red Hat's single sign-on technology.

More security articles

Latest Comments

Waiting for Disqus…