Wednesday, August 17, 2022
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > Red Hat unveils cross-portfolio security capabilities

Red Hat unveils cross-portfolio security capabilities

Red Hat announced new security innovations and capabilities for its open hybrid cloud technologies portfolio.


Erdem Yasar Erdem Yasar
May 11, 2022
1 min read
Red Hat unveils cross-portfolio security capabilities

Red Hat introduced new levels of cross-portfolio security capabilities to allow organizations to boost their security postures and adopt DevSecOps. The new capabilities aim to help organizations mitigate risks and meet compliance requirements across IT environments that mix cloud services, traditional systems, and edge devices. With these enhancements, Red Hat intends to reduce the complexity and improve organizations’ security posture.

Enhancing supply chain security

Red Hat’s new software supply chain security pattern delivers complete stacks as code and defines, builds, and tests the necessary software configurations. The pattern, available as a preview, brings the necessary components to architect cloud-native applications from trusted components together. It uses a Kubernetes-native, continuously-integrated pipeline through Red Hat OpenShift Pipelines and Red Hat OpenShift GitOps.

Vincent Danen, Vice President of Product Security at Red Hat
Vincent Danen, Vice President of Product Security at Red Hat

Red Hat also unveiled a technical preview of Ansible content signing technology in Red Hat Ansible Automation Platform 2.2. It enables automation teams to validate that the automation content being executed in their enterprise is verified and trusted to help with software supply chain security. Vincent Danen, Vice President of Product Security at Red Hat said,

« This is Red Hat’s commitment to DevSecOps – making security not something bolted on, but a seamless integral part of moving applications from development to production to assist IT teams, both technically and organically. »

See more Cybersecurity News


Tags: Red Hat

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
Top Level Design acquires .tattoo

Top Level Design acquires .tattoo

Related News

Critical Realtek vulnerability leaves networking devices at risk

Critical Realtek vulnerability leaves networking devices at risk

August 17, 2022 7:15 pm
Trend Micro warned about incomplete or faulty patches

Trend Micro warned about incomplete or faulty patches

August 17, 2022 7:00 pm
1,900 Signal users' phone numbers may be exposed

1,900 Signal users’ phone numbers may be exposed

August 16, 2022 10:05 pm
10 malicious packages found on PyPI

10 malicious packages found on PyPI

August 16, 2022 9:30 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the Cloud7 Newsletter

Sign up for the Cloud7 Newsletter to receive the latest IT business updates straight to your inbox daily.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Editor's Choice

Interview with Igor Seletskiy on AlmaLinux

7 best hosting control panels

How to update Linux Kernel without rebooting?

7 best Linux mail servers for 2022

7 best cPanel alternatives for 2022

7 best Linux web browsers for 2022

7 best CentOS alternatives

7 best Linux server distros for 2022

How to scan your server for Log4j (Log4Shell) vulnerability

10 Best Web Hosting Services of 2022

AlmaLinux 8.6 Stable is ready to download

Ubuntu 22.04 LTS is available for download. What is new?

Kali Linux 2022.2 is ready for download

Recent News

  • Deepin 23 Preview is released with atomic updates
  • Critical Realtek vulnerability leaves networking devices at risk
  • Trend Micro warned about incomplete or faulty patches
  • Proton 7.0-4 comes with support for more games
  • Cloud7 Podcast – Episode 10: Software-Defined Storage


Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2022, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

© 2022, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.