Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

securityblog.redhat.com

Red Hat Security

Get the latest updates from Red Hat Security directly as they happen.

Follow now 55 followers

Latest posts

Last updated about 14 hours ago

Introducing Red Hat Technical Account Management Service for Product Security

2 days ago

For customers who want to step up their defenses against the next...

Introducing OpenShift Service Mesh 3.1

12 days ago

Red Hat OpenShift Service Mesh 3.1 has been released and is included...

Deploy sensitive workloads with OpenShift confidential containers

18 days ago

OpenShift confidential containers (CoCo) is now generally available for Microsoft Azure. You...

Confidential containers on Microsoft Azure with Red Hat OpenShift Sandboxed Containers 1.10 and Red Hat Build of Trustee

18 days ago

Red Hat OpenShift sandboxed containers 1.10 has been released, bringing enhanced security...

Reduce risk in Kubernetes: How to separate admin roles for safer, compliant operations

about 1 month ago

In enterprise Kubernetes environments, security risks often arise from overlapping administrative access...

Now available: Red Hat Enterprise Linux Security Select Add-On

about 1 month ago

When you subscribe to Red Hat Enterprise Linux (RHEL), you get security...

Model Context Protocol (MCP): Understanding security risks and controls

about 2 months ago

Model Context Protocol (MCP) is a powerful protocol from Anthropic that defines...

Red Hat Advanced Cluster Security 4.8 simplifies management, enhances workflows and offers deeper external IP visibility

about 2 months ago

Security continues to be a top priority for organizations managing Kubernetes clusters...

Updates to Red Hat Advanced Cluster Security for Kubernetes Cloud Service strengthen your security posture

2 months ago

Making sure your Kubernetes environment is secure and compliant is a critical...

The open source paradox: Unpacking risk, equity and acceptance

2 months ago

Open source has always been paradoxical: it's software developed by passionate developers...

Red Hat’s global impact on Linux security

2 months ago

Red Hat is built on open source, a global decentralized and transparent...

The 2024 Red Hat Product Security Risk Report: CVEs, XZ Backdoor, SSCAs, AI…oh my!

2 months ago

Grab a large sweet tea or a cup of coffee and read...