IBM brings Cloud Foundry and Red Hat OpenShift together

At the Cloud Foundry Summit in The Hague, IBM today showcased its Cloud Foundry Enterprise Environment on Red Hat’s OpenShift container platform. For the longest time, the open-source Cloud Foundry Platform-as-a-Service ecosystem and Red Hat’s Kubernetes-centric OpenShift were mostly seen as competitors, with both tools vying for enterprise customers who want to modernize their application […] Continue reading IBM brings Cloud Foundry and Red Hat OpenShift together

New cross-industry consortium aims to accelerate confidential computing adoption

The Linux Foundation announced the intent to form the Confidential Computing Consortium, a community dedicated to defining and accelerating the adoption of confidential computing. Companies committed to this work include Alibaba, Arm, Baidu, Google Clo… Continue reading New cross-industry consortium aims to accelerate confidential computing adoption

Manage microservices-based applications with security-focused Istio and Red Hat OpenShift

Red Hat announced the general availability of Red Hat OpenShift Service Mesh to connect, observe and simplify service-to-service communication of Kubernetes applications on Red Hat OpenShift 4, the industry’s most comprehensive enterprise Kubernetes pl… Continue reading Manage microservices-based applications with security-focused Istio and Red Hat OpenShift

Advance Your Red Hat Development With Cybersecurity

Reading Time: 3 minutes By applying its user-driven innovation approach to cloud development technologies, Red Hat has made open-source cloud application development ultra-usable and even more secure.

The post Advance Your Red Hat Development With Cybersecurity appeared first on Security Intelligence.

Continue reading Advance Your Red Hat Development With Cybersecurity

Ransomware Attacks Shift Tactics

I’ve seen a number of reports over the past few months saying that ransomware attacks are on the decline. The IBM X-Force Threat Intelligence Index, for example, saw a significant drop in ransomware, as cybercriminals aren’t using this type of attack … Continue reading Ransomware Attacks Shift Tactics

With the acquisition closed, IBM goes all in on Red Hat

IBM’s massive $34 billion acquisition of Red Hat closed a few weeks ago and today, the two companies are now announcing the first fruits of this process. For the most part, today’s announcement further IBM’s ambitions to bring its products to any public and private cloud. That was very much the reason why IBM acquired […] Continue reading With the acquisition closed, IBM goes all in on Red Hat

With $34B Red Hat deal closed, IBM needs to execute now

In a summer surprise this week, IBM announced it had closed its $34 billion blockbuster deal to acquire Red Hat. The deal, which was announced in October, was expected to take a year to clear all of the regulatory hurdles, but U.S. and EU regulators moved surprisingly quickly. For IBM, the future starts now, and […] Continue reading With $34B Red Hat deal closed, IBM needs to execute now

Netflix researcher spots TCP SACK flaws in Linux and FreeBSD

Three vulnerabilities in the FreeBSD and Linux kernels could allow attackers to induce a denial-of-service by clogging networking I/O. Continue reading Netflix researcher spots TCP SACK flaws in Linux and FreeBSD

SACK TCP flaws can crash, slow down Linux-based systems

An engineering manager at Netflix has unearthed several TCP networking vulnerabilities in Linux and FreeBSD kernels that could lead to systems crashing or consuming too many resources and (consequently) slowing down. About the vulnerabilities The flaws… Continue reading SACK TCP flaws can crash, slow down Linux-based systems