Security

Featured image for Red Hat article roundup
Article

Red Hat Developer roundup: Best of June 2022

June 30, 2022

Security, code tracing, SaaS, and more: Get the Red Hat Developer highlights for the month.

Vulnerability analysis of Golang applications and more with Red Hat CodeReady Dependency Analytics v0.3.2
Article

Cross-site scripting: Explanation and prevention with Go

June 28, 2022

Looking to understand the various cross-site scripting techniques used by attackers? Learn the details from developer experts including XSS prevention methods.

Featured image for Kubernetes topics.
Article

8 open source Kubernetes security tools

June 20, 2022

See how a number of tools, like KubeLinter, kube-bench, and kube-hunter, can reveal problems in your Kubernetes configuration.

Featured image for Kubernetes topics.
Article

4 tips for achieving better security on Kubernetes

June 14, 2022

Red Hat's report, 2022 State of Kubernetes security, offers recommendations for organizations' practices to increase protection.

Featured image for Automate dependency analytics with GitHub Actions
Article

Kubernetes security risks that keep developers up at night

June 13, 2022

A Red Hat survey revealed that security flaws are hindering innovation in Kubernetes container environments. DevSecOps is described as an emerging model.

systemd Commands cheat sheet card image
Cheat Sheet

systemd Commands Cheat Sheet

Bob Reselman
June 6, 2022

The systemd service runs on Linux to consolidate service configuration and application behavior: starting, stopping, and so forth. systemd is found in Red Hat Enterprise Linux as well as other Linux distributions.

Featured image for: Value range propagation in GCC with Project Ranger.
Article

Use compiler flags for stack protection in GCC and Clang

June 2, 2022

Smash-stacking attacks are common, but the GCC and Clang compilers have a number of flags that can help defend against them. Read on for more info.