Red Hat boosts performance for cloud-native application development with new portfolio updates
Red Hat unveiled updates across its portfolio of developer tools designed to help organizations build and deliver applications faster and more consistently across …
Red Hat announces enhancements across its portfolio of open hybrid cloud solutions
Red Hat announced new capabilities and enhancements across its portfolio of open hybrid cloud solutions aimed at accelerating enterprise adoption of edge compute architectures …
Red Hat and Accenture expand partnership to drive innovation and IT modernization at scale
Red Hat and Accenture have expanded their nearly 12 year strategic partnership to further power open hybrid cloud innovation for enterprises worldwide. The companies are …
Contrast Security provides Red Hat OpenShift users with cloud-native automation
Contrast Security announced the introduction of cloud-native automation for users leveraging Red Hat OpenShift, an enterprise Kubernetes platform. Red Hat OpenShift users can …
Red Hat Application Foundations accelerates containerized application development in the cloud
Red Hat announced Red Hat Application Foundations, a connected set of application services that together with Red Hat OpenShift, help accelerate containerized application …
Easily exploitable Linux bug gives root access to attackers (CVE-2022-0847)
An easily exploitable vulnerability (CVE-2022-0847) in the Linux kernel can be used by local unprivileged users to gain root privileges on vulnerable systems by taking …
Nebulon Red Hat Ansible Collection accelerates automation efforts for IT organizations
Nebulon announced it has developed a Red Hat Ansible collection for smartInfrastructure, which includes a set of modules that customers can use to integrate Nebulon …
Samba bug may allow code execution as root on Linux machines, NAS devices (CVE-2021-44142)
A critical vulnerability (CVE-2021-44142) in Samba, a widely used open source implementation of the Server Message Block (SMB) networking protocol, could allow attackers to …
PolKit vulnerability can give attackers root on many Linux distros (CVE-2021-4034)
A memory corruption vulnerability (CVE-2021-4034) in PolKit, a component used in major Linux distributions and some Unix-like operating systems, can be easily exploited by …
Red Hat OpenShift Data Science enables companies to solve critical business challenges
Red Hat released Red Hat OpenShift Data Science as a field trial, as well as an expanded partner ecosystem focused on this new cloud service offering. As leading artificial …
SynSaber appoints Mark Weatherford and Ali Golshan to its Advisory Board
SynSaber announced the appointment of distinguished cybersecurity leaders Mark Weatherford and Ali Golshan to its advisory board. With more than two decades of experience each …
Veritas InfoScale 8 provides storage optimization for stateful Kubernetes critical workloads
Veritas Technologies announced the next evolution of Veritas InfoScale that will enable customers to deploy InfoScale as containers in native Kubernetes platforms, including …