Security

Enhance security with automation_Share
E-book

Enhance security with automation

Red Hat

Explore proven strategies for protecting against security threats using automation in this short e-book.

Featured image for Automate dependency analytics with GitHub Actions
Article

End-to-end field-level encryption for Apache Kafka Connect

Hans-Peter Grahsl

This article introduces end-to-end encryption for data integration scenarios built on top of Apache Kafka using Kafka Connect together with the open-source library Kryptonite for Kafka.

Featured image for: Value range propagation in GCC with Project Ranger.
Article

GCC's new fortification level: The gains and costs

Siddhesh Poyarekar

Discover the gains and costs of GCC’s enhanced runtime buffer overflow protection. Level 3 _FORTIFY_SOURCE preprocessor macro may detect more buffer overflows, but there’s a cost.