A developer’s guide to setting supply chain security in DevSecOps
This short guide introduces key principles, tools, and techniques you need to know to better audit and act on vulnerabilities in open source software.
This short guide introduces key principles, tools, and techniques you need to know to better audit and act on vulnerabilities in open source software.
Learn how to use the Red Hat OpenShift Data Science platform and Starburst to develop a fraud detection workflow with an AI/ML use case.
Learn about OS command injection attacks and 4 essential best practices to prevent them.
Learn how to configure SOAP web services with the Red Hat build of Apache Camel and Quarkus.
Learn how to write a secure and maintainable Dockerfile with these 10 tips and best practices.
This article discusses configuration best practices and recommendations for the Knative Broker implementation for Apache Kafka, which is now GA.
Learn about 5 global-level environment variables that OpenShift GitOps offers organizations to tailor their experience.
Learn about the RHEL image builder improved functionality and security, now available in RHEL 9.1 and 8.7.
Discover how to improve application and library security at the source with _FORTIFY_SOURCE macro defined to 3 and how it impacts performance.
Learn techniques to secure applications and prevent break-ins and data theft.
In Cryostat 2.2, security credentials are more flexible and can be reused across many different applications.
As we head into Thanksgiving, we want to share some of the top tutorials, announcements, and guides that our developer community has engaged with the most.
Learn about static application security testing (SAST) and how it improves software security.
Interactions between libraries can cause embarrassing crashes during shutdown, but OpenSSL provides a robust shutdown procedure.
Discover 10 essential solutions and tools to mitigate security risks throughout each step of the API life cycle.
Learn how Kryptonite for Kafka's SMT can help you encrypt and decrypt individual field records in a granular way when building data integration scenarios on top of Kafka Connect.
Discover how flexible array members offer convenience and improve performance, and how compiler complexities are mitigated.
This article introduces end-to-end encryption for data integration scenarios built on top of Apache Kafka using Kafka Connect together with the open-source library Kryptonite for Kafka.
Hashes and encryption are fundamental to data center administration, collaborative software development, and more.
Discover the gains and costs of GCC’s enhanced runtime buffer overflow protection. Level 3 _FORTIFY_SOURCE preprocessor macro may detect more buffer overflows, but there’s a cost.
See site reliability engineering (SRE) principles in action and learn how to improve the operability of your code base with this developer coloring book.
Discover how Red Hat Ansible Automation Platform provides better security by automating intrusion detection, edge security, firewalls, and more.
Find recent articles on observability, containerizing .NET applications, tips for building security into your Node.js development process, and more.
Discover how to improve the security of your Software-as-a-Service deployment at the hardware, OS, container, Kubernetes cluster, and network levels.
Online events and regional events held around the world with Red Hat's Developer Advocates.