Improve basic programming safety with Rust lang
Explore Rust features that can help you write more secure code, along with techniques and tips to help make software more resilient to attacks.
Explore Rust features that can help you write more secure code, along with techniques and tips to help make software more resilient to attacks.
Download this e-book to learn key concepts for building security into your software supply chain, along with best practices for implementation.
Learn the basics of OperatorPolicy, a new kind of resource, and how you can use it to manage Operator Lifecycle Manager resources across a fleet of clusters inside the policy framework.
Learn how Red Hat Insights can synchronize its system tags with external sources, such as Amazon Elastic Compute Cloud (EC2) and Microsoft Azure.
Learn about the ComplianceAsCode project for Red Hat OpenShift, which aims to provide security and compliance content for various distributions and products.
Explore the benefits of testing Ansible content within Red Hat OpenShift Dev Spaces.
This article demonstrates how to install Ansible lint and provides examples of how it improves playbook debugging and saves time.
Discover more about Red Hat Trusted Application Pipeline, a secure and easy solution for the DevSecOps outer loop.
This article demonstrates how to install MSSQL using Ansible Vault, an Ansible Automation Platform feature, to protect sensitive information.
Learn how the FORTIFY_SOURCE feature in the GNU C library improves C code security by detecting and preventing buffer overflow, and more.
Learn how to deploy single sign-on as code using GitOps in this demonstration.
Learn about OS command injection attacks and 4 essential best practices to prevent them.
Discover how to improve application and library security at the source with _FORTIFY_SOURCE macro defined to 3 and how it impacts performance.
Valgrind can be used to track file descriptors. Learn how to find file descriptors at various stages of your program and where they were originally opened.
Learn techniques to secure applications and prevent break-ins and data theft.
Discover why the Linux kernel returns an errno code using SystemTap and how to use the whythefail.stp script in this demonstration.
Learn about static application security testing (SAST) and how it improves software security.
Discover key elements of building security into your software development process such as managing access in part 9 of the Node.js reference architecture series.
Service bindings, the kube-service-bindings npm package, and the Red Hat OpenShift UI make it easier to connect securely to a database on Kubernetes.
Most Linux kernel testing happens from userspace and can be done using simple commands for system calls, logging, and more.
Learn to use Git's clean/smudge filter to secure secret data like tokens, private server addresses, and PII when working on public Git repositories.
Learn what DevSecOps is, why it matters, and how to start using it to create secure code at the beginning of your projects with this guide from Red Hat.
Follow this step-by-step guide to create secure deployments in Red Hat services using entitlements, certificate authority, configuration files, and BuildConfig.
Find out what debugging information is, where it's stored, and how to inspect it. This article is the second of a three-part series about using GNU Debugger.
Visual Code is an easy way to debug .NET applications in cloud environments like Kubernetes and OpenShift. Learn which plug-ins and configurations you need.