Agent Skills: Explore security threats and controls
Learn how to manage the security threats and access controls associated with adopting the new Agent Skills functionality.
Learn how to manage the security threats and access controls associated with adopting the new Agent Skills functionality.
In this blog post, we're looking at how the Tech Preview of Red Hat trusted
OpenShift networking moves to real routing (CUDN/BGP), eliminating NAT and Geneve tunnels for better performance, L3 integration, and full visibility.
Learn how to implement TokenRateLimitPolicy for LLM APIs. This approach to advanced rate limiting ensures fair use and better cost management in AI workflows.
Learn how Red Hat's contextual SBOM pattern solves the problem of understanding package provenance in container images by establishing relationships between container images and their parent and builder images within the software supply chain. Improve vulnerability management with this hierarchical view.
This blog post presents the performance analysis of Identity Management (IdM) when encrypted DNS (eDNS) is introduced in an Red Hat OpenShift 4.20 cluster. The post includes a detailed discussion on the architecture of the setup, tuning of IdM, and performance testing of the system under various scenarios. The results demonstrate that the system can sustain high throughput and low latency even with eDNS, making it a suitable choice for secure and high-performance DNS solutions.
Discover the new LibSSH connection plug-in for Ansible, replacing the existing Paramiko SSH subsystem and adding FIPS mode enablement.
Learn how to build a zero trust environment using Red Hat Connectivity Link and manage connectivity between services, gateways, and identity providers.
This guide demonstrates the configuration process and provides best practices for deployment with multiple authentication providers in Developer Hub.
Discover the new features in Red Hat Advanced Cluster Security that allow integrating component health and security data into Prometheus for better observability and alerting.
Learn about the upcoming expiration of Microsoft's Secure Boot signing certificate and its implications for Red Hat Enterprise Linux systems. Get comprehensive answers, resources, and recommended actions to ensure system bootability and security.
Red Hat OpenShift 4.21 introduces AI-driven insights, automated security signing, and local development tools to help you build and deploy faster.
This article compares the performance of UDP, TCP, and DoT for DNS traffic in an Identity Management (IdM) environment under sustained high load. We explore a stress scenario with a standard client generating over 1,000 DNS queries per second against an IdM DNS server, and assess the impact of encryption on DNS performance.
This guide details how to use curl and jq to retrieve and format CVE data in readable text and structured CSV formats for data analysis and security tasks.
Discover how Red Hat Lightspeed MCP integrates AI to help simplify vulnerability management, prioritize security risks, and automate remediation planning.
Explore the integration of Red Hat's zero trust workload identity manager with confidential containers, providing defense in depth through hardware-rooted trust and cryptographic identity verification.
Eliminate static secrets and adopt a zero trust security model in your CI/CD pipelines using Tekton, HashiCorp Vault, and user-defined networks on OpenShift.
Configure Istio gateways in Red Hat OpenShift Service Mesh with PQC algorithms to protect external traffic from current and future quantum computer attacks.
Learn how to protect secrets, enforce compliance, and build a trusted software supply chain using Tekton Pipelines on Red Hat OpenShift on IBM Cloud.
Learn about Fedora Rawhide testing a solution that embeds SBOM metadata directly into Python wheels, allowing scanners to recognize backported security fixes.
Simplify the management of numerous Red Hat OpenShift HyperShift (HCP) clusters
Learn how to implement identity-based tool filtering, OAuth2 Token Exchange, and HashiCorp Vault integration for the MCP Gateway.
Learn how to enable Red Hat Lightspeed in disconnected environments with Red Hat Satellite 6.18. Set up advisor and vulnerability services to manage risk.
What RHEL 8 and 9 users need to know about Python 3.9 reaching the end-of-life phase upstream.
Learn how to run Ruby applications in FIPS mode on Red Hat Enterprise Linux (RHEL) using the Ruby OpenSSL library.