This is the third article in a series on confidential computing published originally on the Red Hat blog. To read the original in its entirety, click HERE. In the existing implementations (with the notable exception of Intel SGX), confidential computing is fundamentally…
The Need for Attestation In Confidential Computing
This is the second article in a series on confidential computing published originally on the Red Hat blog. To read the original in its entirety, click HERE. In a confidential computing environment, another form of proof called attestation becomes increasingly…
Public sector cloud migration strategies—How these help pave the way for successful IT modernization
From tech layoffs to hiring freezes, it’s no secret that the IT industry has been through a rollercoaster ride of changes these past few years. Recently, there’s been a broad-based misconception within the tech industry and across the public sector…
Three Key Findings from Red Hat’s 2023 State of Kubernetes Security Report
Earlier this month, Red Hat released its The State of Kubernetes Security for 2023 report. This annual report explores the specific security risks organizations face regarding cloud-native development, including risks to their software supply chain, and how they mitigate these risks…
An Open Source Solution to the Cycle of Veteran Suicide
This article was originally published on the Red Hat Blog. To read the original in its entirety, click HERE. In 2022, Red Hat teamed with global consulting services provider Guidehouse and Philip Held, Ph.D. of Rush University Medical Center, to…
Technology at the edge—How cloud computing has benefitted the DHS and DoD
Over the past two decades, cloud computing has exploded in popularity among businesses, organizations, agencies, and individuals. Today, the cloud is widely used across organizations and enterprises to make their IT architectures more scalable, and enable their organizations to provision…
Keeping the Lights on with Event-Driven Automation
This article originally appeared on the Red Hat Blog. To read the original in its entirety, click HERE. IT operations teams face challenges in Day 2 operations. But what are Day 2 operations? According to Red Hat’s Bill Cozens, “We talk…
Securing Your Open Source Software Supply Chain
This article originally appeared on the Red Hat blog. To read the original in its entirety, click HERE. As an engineer on the Supply Chain team, the more I dive into software development, the more I have come to understand…
The new face of military power—How AI & ML are improving drones
Unmanned aerial vehicles (UAVs) may seem like a new advancement on the battlefield, but today’s modern UAVs – or drones as they’re commonly known – are the evolution of a technology that was used in the Vietnam War. Back then,…
An Introduction to Hardening
This article is part of a series on STIGs that was originally featured on the Red Hat blog. To read this article – and the STIG series – in full, click HERE. Secure Technology Implementation Guides (STIGs) as a framework…