DevSecOps
UOB TechTalks Series 2 Track 2: Secure Software Chain
DevNation Day: Modern App Dev videos are now available
We've rounded up videos from DevNation Day: Modern App Dev, a virtual event for developers covering software, containers, modernization, and more.
A developer’s guide to setting supply chain security in DevSecOps
This short guide introduces key principles, tools, and techniques you need to know to better audit and act on vulnerabilities in open source software.
Red Hat Summit 2023
Red Hat Summit 2023
App Dev Platform
Drive team productivity and accelerate innovation
The Modern Developer
Developer experience plays a critical role in the digital transformation journey. Discover how an internal developer platform (IDP) helps teams innovate faster.
Event Tutorials
Select tutorials for in-person events
Best practices for successful DevSecOps
Learn the best traits for build, deploy, and runtime pipelines in the increasingly popular practice of DevSecOps.
Manage Python security with Thoth's cloud-based dependency resolver
Get a video introduction to Project Thoth's cloud-based Python dependency resolver, then learn how to manage Python dependencies on the Thoth command line.
DevSecOps: Why you should care and how to get started
Learn what DevSecOps is, why it matters, and how to start using it to create secure code at the beginning of your projects with this guide from Red Hat.
Red Hat Developer roundup: Best of December 2021
Highlights of December 2021 include two guides for integrating Red Hat OpenShift Streams for Apache Kafka. Read the entire monthly recap for further details.
Secure communication with Red Hat Decision Manager
Get step-by-step instructions to install and configure a self-signed certificate for secure HTTPS communication with Red Hat Decision Manager.
How DevSecOps brings security into the development process
Extend common DevOps tools and processes with DevSecOps to improve app security. Enable security automation and help teams collaborate on security policies.
Automate dependency analytics with GitHub Actions
Learn to automate dependency analytics by integrating code scanning into your CI pipeline. Use the CodeReady Dependency Analytics GitHub Action to spot flaws.
Sensitive information detection using the NVIDIA Morpheus AI framework
Set up the NVIDIA Morpheus AI application framework and NVIDIA BlueField-2 data processing units with Red Hat OpenShift and Red Hat Enterprise Linux.
DevSecOps: Automating security in the development lifecycle
Learn how security teams are using DevOps principles and CI/CD pipelines to
Kubernetes admission control with validating webhooks
Learn to write, configure, and install a webhook that intercepts and validates Kubernetes requests, stopping users from creating rules with invalid fields.
Connect to an external PostgreSQL database using SSL/TLS for Red Hat's single sign-on technology
Learn how to connect to external PostgreSQL databases via SSL/TLS for Red Hat's single sign-on technology (SSO). This technique ensures secure connectivity.
Managing GitOps control planes for secure GitOps practices
Learn about the tools Red Hat has available to implement GitOps workflows. Use the examples to set up control planes to gain full control of your project.
Red Hat JBoss Enterprise Application Platform 7.4 brings new developer and operations capabilities
Explore new features in Red Hat JBoss Enterprise Application Platform 7.4, including enhancements for security, management, and developer productivity.
How to apply machine learning to GitOps
Improve deployment processes and outcomes by applying machine learning in each phase of the GitOps life cycle. Automate your infrastructure with Red Hat.
Integrate Red Hat Data Grid and Red Hat JBoss Enterprise Application Platform on Red Hat OpenShift
Follow these steps to integrate Data Grid and JBoss EAP in the same project on OpenShift. You can boost application scalability by offloading the session data.
Authentication and authorization using the Keycloak REST API
Learn how to go beyond the simple login API and enable the full force of Keycloak's authentication and authorization features using the Keycloak REST API.
Ask the Expert: Red Hat Developer Tools & CodeReady