Security

Red Hat Security

Hardening Your Open Source Software

With all the data breaches in the new lately, now may be a good time to learn more about securing your stuff. Emmy is the senior manager for the supply chain group that falls under our product security organization. Her team is focused on securing the systems involved with modifying and storing our offering code. […]

Read More
Quantum Computing Security

Understanding and Explaining Post-Quantum Crypto with Cartoons

Are you an IT security professional, but not a mathematician? This session will explain you how post-quantum cryptography works—with a 100 percent cartoon-based slide show.

Read More
Linux

Is Linux Right For You?

After joining Red Hat, I decided to “give up Windows for Lent.” The experiment was a success in the sense that I feel confident about my ability to remain productive should my issues with Windows 11 be resolved. In the meantime, I have reverted my main work driver back to Windows. Like it or not, […]

Read More
Red Hat Security

Red Hat Advanced Cluster Security with Michael Foster

Red Hat Advanced Cluster Security (RHACS) integrates security into Kubernetes environments using its rich context and native controls to protect cloud-native applications across build, deploy, and runtime. As deployments scale, organizations must simplify how they manage and secure these crucial environments. Let’s start as if it’s day 1 with RHACS and work to build a […]

Read More
Databricks

Lakehouse for Financial Services Blueprints Tutorial

Lakehouse for Financial Services Blueprints is a Terraform-based automation template to deploy the Lakehouse Architecture that incorporates patterns from 600+ FS customers. It is tailored for key security and compliance policies and provides FS-specific libraries as quickstarts for key use cases, including Regulatory Reporting and Post-Trade Analytics. Download the Terraform templates.

Read More
Privacy Windows

Does Windows have Back Doors?

Retired Microsoft engineer Davepl discusses “back doors” in Windows, the implications, and how the software developer protects against such attacks from rogues, hackers, and nation-states. Understand how back doors are like the Follina zero-day exploit in Office, giving complete control of the system to the attacker.

Read More
Microsoft Security

Microsoft Security: Breaking the Rules – Stories from Employees

Retired MSFT developer Dave details the age old battle between corporate security policies and recalcitrant users at Microsoft and IBM.

Read More
Red Hat Security

Ask an OpenShift Admin: Closed Loop Cloud-Native Security

Red Hat OpenShift has a lot of moving pieces, and sometimes it may seem like too much to remember. Maybe you have a config problem that no amount of search engine kung-fu can solve? Or that you don’t know where to get started with learning and applying these tools to your day-to-day work? That’s where […]

Read More
Security

Top 7 Most Elite Nation State Hackers

Ever wonder what countries have the most advanced hacking capabilities? This video will cover, what is in my opinion, the top 7 biggest cyber powers in the world.

Read More