How to deploy a MSSQL database using Ansible Vault
This article demonstrates how to install MSSQL using Ansible Vault, an Ansible Automation Platform feature, to protect sensitive information.
This article demonstrates how to install MSSQL using Ansible Vault, an Ansible Automation Platform feature, to protect sensitive information.
Learn how the FORTIFY_SOURCE feature in the GNU C library improves C code security by detecting and preventing buffer overflow, and more.
Find out how automating key cybersecurity strategies can strengthen your security and reduce burden on IT teams in this short e-book.
Explore proven strategies for protecting against security threats using automation in this short e-book.
Stop deploying applications that contain security vulnerabilities
This short guide introduces key principles, tools, and techniques you need to know to better audit and act on vulnerabilities in open source software.
Learn how to use the Red Hat OpenShift Data Science platform and Starburst to develop a fraud detection workflow with an AI/ML use case.
Learn about OS command injection attacks and 4 essential best practices to prevent them.
Learn how to configure SOAP web services with the Red Hat build of Apache Camel and Quarkus.
Learn how to write a secure and maintainable Dockerfile with these 10 tips and best practices.
This article discusses configuration best practices and recommendations for the Knative Broker implementation for Apache Kafka, which is now GA.
Learn about 5 global-level environment variables that OpenShift GitOps offers organizations to tailor their experience.
Learn about the RHEL image builder improved functionality and security, now available in RHEL 9.1 and 8.7.
Create groups so your automation hub users have appropriate system permissions, or grant view-only access to unauthorized users.
Discover how to improve application and library security at the source with _FORTIFY_SOURCE macro defined to 3 and how it impacts performance.
Learn techniques to secure applications and prevent break-ins and data theft.
In Cryostat 2.2, security credentials are more flexible and can be reused across many different applications.
As we head into Thanksgiving, we want to share some of the top tutorials, announcements, and guides that our developer community has engaged with the most.
Learn about static application security testing (SAST) and how it improves software security.
Interactions between libraries can cause embarrassing crashes during shutdown, but OpenSSL provides a robust shutdown procedure.
Discover 10 essential solutions and tools to mitigate security risks throughout each step of the API life cycle.
Learn how Kryptonite for Kafka's SMT can help you encrypt and decrypt individual field records in a granular way when building data integration scenarios on top of Kafka Connect.
Discover how flexible array members offer convenience and improve performance, and how compiler complexities are mitigated.
This article introduces end-to-end encryption for data integration scenarios built on top of Apache Kafka using Kafka Connect together with the open-source library Kryptonite for Kafka.
Hashes and encryption are fundamental to data center administration, collaborative software development, and more.