searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters

Red Hat

Get our top stories in your inbox

Red Hat renews FIPS 140-2 security validation for Red Hat Enterprise Linux 8.2

July 17, 2021

Red Hat announced the renewal of the Federal Information Processing Standard 140-2 (FIPS 140-2) security validation for Red Hat Enterprise Linux 8.2. The second FIPS …

CyberLink collaborates with ASUS to create smart IoT/AIoT applications

July 7, 2021

CyberLink announced a partnership with ASUS, by integrating its FaceMe AI facial recognition engine into ASUS’s Tinker Board 2 single-board computer (SBC). The fruit of a …

BlueBarricade achieves new performance levels for high-speed enterprise blockchain

July 5, 2021

The blockchain accelerator – developed on IBM Blockchain Platform by Sweden-based software house BlueBarricade Blockchain & AI Technology AB – has achieved new …

Red Hat OpenShift 4.8 helps organizations accelerate the creation of new cloud-native applications

June 30, 2021

Red Hat announced Red Hat OpenShift 4.8, the latest version of the enterprise Kubernetes platform. Providing a powerful foundation to develop and connect diverse workloads …

Red Hat Process Automation helps orgs automate complex business decisions and procedures

June 24, 2021

Red Hat announced new end-to-end Kubernetes-native decision management capabilities as part of the latest release of Red Hat Process Automation. Based on the open source …

Siren partners with SECTION6 to strengthen its presence in the APAC region

June 9, 2021

Siren announced a new partnership agreement with Auckland-based SECTION6, a consultancy which specialises in optimising the delivery and operation of critical IT solutions …

AlmaLinux OS 8.4: A free open source alternative to CentOS

May 31, 2021

The AlmaLinux OS Foundation announced availability of AlmaLinux OS 8.4 just one week after the release of Red Hat Enterprise Linux (RHEL) 8.4. “This is our second stable …

Red Hat JBoss EAP on Azure enables the migration of Java applications to cloud environments

May 27, 2021

Red Hat announced Red Hat JBoss Enterprise Application Platform (JBoss EAP) on Microsoft Azure, enabling organizations to tap into the benefits of a cloud-based architecture …

Veeam expands its single platform to protect and manage all workloads

May 27, 2021

Veeam Software showcased a glimpse into its roadmap through 2021 and how the company will continue to provide its customers with the most advanced data protection across all …

CyberLink partners with ACE Biotek for a fully automated solution to control access

May 22, 2021

CyberLink announced a partnership with ACE Biotek, by integrating its FaceMe AI facial recognition engine into ACE Biotek’s Wallie Screen Access Control and Health Screening …

IBM announces hybrid cloud and AI capabilities to boost digital transformation

May 12, 2021

IBM announces advances in artificial intelligence (AI), hybrid cloud, and quantum computing. The innovations highlight IBM’s role in helping its clients and partners …

TrilioVault for Kubernetes 2.1 offers visibility and insights into Velero backups

May 5, 2021

Trilio announced the availability of TrilioVault for Kubernetes (TVK) 2.1, the latest release of its cloud-native backup and recovery platform that enables restoration and …

Posts navigation

1 2 3 4 5 6 7 8 9 … 12

Featured news

  • The root causes of API incidents and data breaches
  • Penetration tester develops AWS-based automated cracking rig
  • CISO-approved strategies for software supply chain security
Spin Up A CIS Hardened Image

Sponsored

The best defense against cyber threats for lean security teams

Webinar: Tips from MSSPs to MSSPs – starting a vCISO practice

Security in the cloud with more automation

CISOs struggle with stress and limited resources

Don't miss

The root causes of API incidents and data breaches

Penetration tester develops AWS-based automated cracking rig

CISO-approved strategies for software supply chain security

Phishers use encrypted file attachments to steal Microsoft 365 account credentials

New Buhti ransomware uses leaked payloads and public exploits

Cybersecurity news
Help Net Security - Daily information security news with a focus on enterprise security.
© Copyright 1998-2023 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us