Security
Headlines
HeadlinesLatestCVEs

Source

Red Hat Blog

New deep threat intelligence in Red Hat Insights: Helping to prioritize what matters the most with system vulnerabilities

<p><strong><a href="https://www.redhat.com/en/technologies/management/insights">Red Hat Insights</a></strong> has added new functionality that helps users determine which of their registered <a href="https://www.redhat.com/en/technologies/linux-platforms/enterprise-linux">Red Hat Enterprise Linux</a> systems are "affected" with a vulnerability but are not “vulnerable.” Yes, “affected but not vulnerable” is a thing, and having this level

Red Hat Blog
#vulnerability#linux#red_hat#intel
A Brief History of Cryptography

<p>Cryptology is a young science.</p> <p>Though it has been used for thousands of years to hide secret messages, systematic study of cryptology as a science (and perhaps an art) just started around one hundred years ago.</p> <p>The first known evidence of the use of cryptography (in some form) was found in an inscription carved around 1900 BC, in the main chamber of the tomb of the nobleman <a href="https://en.wikipedia.org/wiki/Khnumhotep_II">Khnumhotep II</a>, in Egypt. T

OpenSSL: From FIPS 140-2 upstream to 140-3 downstream

<h3>Red Hat Enterprise Linux 9.0 and OpenSSL 3.0</h3> <p>During the development of Red Hat Enterprise Linux (RHEL) 9, we decided to switch to OpenSSL 3.0 even though we were not sure that it would be finalized early enough. This decision was made to significantly reduce our maintenance burden during the 10+ years of RHEL 9 support.</p> <p>One of the anticipated changes in OpenSSL 3.0 was the new provider model. The provider that we were particularly interested in was the one implementing Federal Information Processing

Red Hat Insights malware detection service is now generally available

<p>Following <a href="https://www.redhat.com/en/blog/getting-started-red-hat-insights-malware-detection">the announcement of the beta of the Red Hat Insights malware detection service</a> in August, we are pleased to announce that this service is now generally available. The malware detection service is a monitoring and assessment tool that scans <strong><a href="https://www.redhat.com/en/technologies/linux-platforms/enterprise-linux">Red Hat Enterprise Linux</a></stro

Red Hat Government Symposium 2022: Unleashing innovation, powering missions

<p>Across government, organizations have extended operations from the datacenter to multiple public clouds to the edge. Now they need to manage data and deliver intelligent capabilities across those environments. More than ever, they must achieve those goals with greater simplicity, consistency and availability, along with enhanced security of their IT operations.</p> <p>These imperatives were the focus of <a href="https://www.redhat-govsymposium.com/program/">Red Hat Government Symposium 2022</a>, which

Automate like an expert with Ansible validated content

<p>During <strong><a href="https://www.ansible.com/ansiblefest">AnsibleFest 2022</a></strong>, we announced the launch of <strong>Ansible validated content</strong>. This new initiative is focused on delivering an expert-led approach for automating your platform portfolio across infrastructure, networking, cloud, security and edge use cases.</p> <p>Ansible validated content is a new set of collections containing pre-built YAML content (such as playb

Using system tags to enable extended security hardening recommendations

<p>Today we present a new way to use the <strong><a href="https://www.redhat.com/en/technologies/management/insights">Red Hat Insights</a></strong> Advisor service by <a href="https://access.redhat.com/articles/6981482">using system tags</a> to enable extended security hardening recommendations.</p> <p>Not all systems are equal. For example, a web server and a workstation have different security profiles. For systems with extended

Beyond the STIG: The wider world of cybersecurity

<p><span><span><span><span><span><span>Depending on how deeply you deal with sensitive computing requirements and IT systems security, the phrase “STIG” either means:</span></span></span></span></span></span></p> <ul> <li aria-level="1"><span><span><span><span><span><span

Understanding the Confidential Containers Attestation Flow

<h2><span><span><span><span><span><span>Introduction to attestation</span></span></span></span></span></span></h2> <p><span><span><span><span><span><span>Attestation is a confidential computing keystone. With attestation, workload owners can fully assert the trustworthiness of the hardware and software

Red Hat OpenShift: How to create and integrate a private registry with stronger security capabilities

<p><span><span><span><span><span><span>A private registry can be useful for storing Linux </span></span></span></span></span></span><a href="https://www.redhat.com/en/topics/containers"><span><span><span><span><span><span><span><span>container images</span>&am