Software Security for Developers
Improve your application's security and close vulnerabilities with improved tooling and processes.
Application Security Posts
Checkpoint/restore is useful when migrating containers in Kubernetes. Learn how this feature was implemented and how it's used in container migrations.
You can use Red Hat's single sign-on technology (SSO) to connect with Red Hat Data Grid, even without Secure Sockets Layer protection.
Learn how Project Thoth's new security recommender makes a recommendation, then use the Thamos CLI to find security issues in your Python library code.
Get an overview of admission control in Kubernetes, then write and deploy a simple webhook that intercepts and validates Prometheus rule creations.
Demoting malloc hooks solves critical security issues in glibc's memory allocation system. Find out how the changes could affect your applications.
Learn how you can implement secure GitOps practices for developer teams by setting up control planes with the Red Hat OpenShift GitOps operator.