Software Security for Developers

Improve your application's security and close vulnerabilities with improved tooling and processes. 

Application Security Posts

Featured image for GitOps + Kubernetes
Article

Checkpoint and restore in Kubernetes

October 7, 2021

Checkpoint/restore is useful when migrating containers in Kubernetes. Learn how this feature was implemented and how it's used in container migrations.

Quarkus + data grid
Article

How to connect to Red Hat Data Grid without SSL

October 6, 2021

You can use Red Hat's single sign-on technology (SSO) to connect with Red Hat Data Grid, even without Secure Sockets Layer protection.

Featured image for: Can we consider --editable a bad practice?
Article

Secure your Python applications with Thoth recommendations

September 29, 2021

Learn how Project Thoth's new security recommender makes a recommendation, then use the Thamos CLI to find security issues in your Python library code.

Featured image for Kubernetes topics.
Article

Kubernetes admission control with validating webhooks

September 17, 2021

Get an overview of admission control in Kubernetes, then write and deploy a simple webhook that intercepts and validates Prometheus rule creations.

Featured image for C-language topics.
Article

Securing malloc in glibc: Why malloc hooks had to go

August 25, 2021

Demoting malloc hooks solves critical security issues in glibc's memory allocation system. Find out how the changes could affect your applications.

Featured image for GitOps + Kubernetes
Article

Managing GitOps control planes for secure GitOps practices

Chetan Banavikalmutt, Shubham Agarwal
August 3, 2021

Learn how you can implement secure GitOps practices for developer teams by setting up control planes with the Red Hat OpenShift GitOps operator.

More security articles

Latest Comments

Waiting for Disqus…