
How static application security testing improves software security
Learn about static application security testing (SAST) and how it improves software security.
Learn about static application security testing (SAST) and how it improves software security.
Interactions between libraries can cause embarrassing crashes during shutdown, but OpenSSL provides a robust shutdown procedure.
Discover 10 essential solutions and tools to mitigate security risks throughout each step of the API life cycle.
Learn how Kryptonite for Kafka's SMT can help you encrypt and decrypt individual field records in a granular way when building data integration scenarios on top of Kafka Connect.
Discover how flexible array members offer convenience and improve performance, and how compiler complexities are mitigated.
This article introduces end-to-end encryption for data integration scenarios built on top of Apache Kafka using Kafka Connect together with the open-source library Kryptonite for Kafka.
Hashes and encryption are fundamental to data center administration, collaborative software development, and more.
Discover the gains and costs of GCC’s enhanced runtime buffer overflow protection. Level 3 _FORTIFY_SOURCE preprocessor macro may detect more buffer overflows, but there’s a cost.
See site reliability engineering (SRE) principles in action and learn how to improve the operability of your code base with this developer coloring book.
Discover how Red Hat Ansible Automation Platform provides better security by automating intrusion detection, edge security, firewalls, and more.
Find recent articles on observability, containerizing .NET applications, tips for building security into your Node.js development process, and more.
Discover how to improve the security of your Software-as-a-Service deployment at the hardware, OS, container, Kubernetes cluster, and network levels.
Online events and regional events held around the world with Red Hat's Developer Advocates.
Dekorate simplifies the management of custom resources for cert-manager certificates in the cloud. Learn an easier way to generate cert-manager custom resources.
Security policies can be deployed through CI/CD and Red Hat Advanced Cluster Security for Kubernetes. Read on to learn how.
Security, code tracing, SaaS, and more: Get the Red Hat Developer highlights for the month.
Looking to understand the various cross-site scripting techniques used by attackers? Learn the details from developer experts including XSS prevention methods.
See how a number of tools, like KubeLinter, kube-bench, and kube-hunter, can reveal problems in your Kubernetes configuration.
Red Hat's report, 2022 State of Kubernetes security, offers recommendations for organizations' practices to increase protection.
A Red Hat survey revealed that security flaws are hindering innovation in Kubernetes container environments. DevSecOps is described as an emerging model.
Learn commands for the systemd service, which is found in Red Hat Enterprise Linux as well as other Linux distributions.
Smash-stacking attacks are common, but the GCC and Clang compilers have a number of flags that can help defend against them. Read on for more info.
You can compile Go code on Red Hat Enterprise Linux in such a way that it complies with U.S. Federal encryption standards. Find out how.
It is now easier to use Cryostat for monitoring Java applications on OpenShift. This article details changes to the login flow in Cryostat 2.1.
Use Red Hat's SSO with OpenLDAP to authorize producers and consumers for Kafka in Red Hat AMQ Streams