searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters

Red Hat

Get our top stories in your inbox

Tigera now supports Calico Open Source on Amazon EKS Anywhere

October 7, 2021

Tigera announced support for Calico Open Source, an open-source technology for container networking and security, on Amazon EKS Anywhere, giving users more freedom of choice. …

Stratasys ProtectAM helps safeguard sensitive information across DoD networked 3D printers

October 6, 2021

Stratasys introduced a new data security solution to enhance the cybersecurity of additive manufacturing as its role in government and defense applications grows larger and …

JFrog receives CNA certification to help security researchers verify and triage their vulnerabilities

October 6, 2021

JFrog announced it has been designated by the CVE Program as a CVE Numbering Authority (CNA). With this certification, JFrog joins an elite group of public and private sector …

Equinix expands support for Kubernetes to help companies scale their apps across any infrastructure

October 5, 2021

Equinix announced it has expanded its neutral ecosystem of technologies and partner solutions that support the deployment, management and operations of Kubernetes on Equinix …

Cloudify 6 simplifies the continuous management of large-scale deployments

October 2, 2021

Cloudify 6 launches, introducing Environment as a Service 2.0: a new hierarchical environment management capability that simplifies the continuous management of large-scale …

Red Hat Ansible Automation Platform 2 adds self-contained automation capabilities

October 1, 2021

Red Hat announced Red Hat Ansible Automation Platform 2 as the company’s new standard for hybrid cloud automation. Refined for the evolving realities of computing at hybrid …

UKCloudX supports UK government digital ambitions with Defence Cloud offering

September 15, 2021

UKCloudX announced its new Defence Cloud offering to support the UK MOD strategic vision of information superiority through digital technology. The recently published Digital …

Asian Development Bank and Alliance Bank choose Red Hat platform to better align automation strategies

September 10, 2021

Red Hat shared that leading banks such as Alliance Bank (Malaysia) and the Asian Development Bank (Philippines) have adopted Red Hat Ansible Automation Platform as its …

Aqua Security and IBM bring end-to-end cloud native security to Power10-based systems

September 9, 2021

Aqua Security announced that the company will be the first cloud native security PartnerWorld partner supporting the launch of the new IBM Power10-based IBM Power E1080 …

Building for transactional workloads is the primary concern around deploying Kubernetes

August 31, 2021

Research conducted by Cockroach Labs and Red Hat shows 94% of organizations surveyed deploy services and applications on Kubernetes — but how they deploy varies widely. The …

Security and compliance still a challenge for container architectures

August 24, 2021

While adoption of container architectures and microservices continues at an impressive pace, maintaining automated and proactive security and compliance is a particularly …

Tigera addresses growing demand for security of containers, Kubernetes, and microservices

August 13, 2021

Tigera launched a worldwide partner program to meet demand from the growing adoption of containers, Kubernetes, and microservices, which has created security and observability …

Posts navigation

1 2 3 4 5 6 7 … 12

Featured news

  • Overcoming obstacles to introduce zero-trust security in established systems
  • Leveraging network automation to enhance network security
  • Ransomware gangs are exploiting IBM Aspera Faspex RCE flaw (CVE-2022-47986)
Guide: Aligning your security program with the NIST CSF

Sponsored

Webinar: Tips from MSSPs to MSSPs – starting a vCISO practice

Security in the cloud with more automation

CISOs struggle with stress and limited resources

How to scale cybersecurity for your business

Don't miss

Overcoming obstacles to introduce zero-trust security in established systems

Leveraging network automation to enhance network security

Ransomware gangs are exploiting IBM Aspera Faspex RCE flaw (CVE-2022-47986)

3CX customers targeted via trojanized desktop app

The rise of biometrics and decentralized identity is a game-changer for identity verification

Cybersecurity news
Help Net Security - Daily information security news with a focus on enterprise security.
© Copyright 1998-2023 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us