Categories
00 - IT Automation & Management Datacenter Operations General Linux Security system management systems management

How often do you patch ?

Historically, there have been two schools of thought about patching: Patch as soon as a patch is available to eliminate security risks versus testing the patch extensively before it is applied to production systems ( aka “Never change a running system” ). One of the main reasons why you might feel the need to patch […]

Categories
00 - Cloud-Native App Dev 00 - Hybrid Cloud Infrastructure Security

You’ve written a Kubernetes-native Application? Here is how OpenShift helps you to run, develop, build and deliver it – securely! (1/4)

This blog kicks off a series of 4 blog articles. They will all be available here, as soon as they get published. Run: Get your Angular, Python or Java Dockerfile ready with Red Hat’s Universal Base Image and deploy with Helm on OpenShift Develop: The Inner Loop with OpenShift Dev Spaces Build: From upstream Tekton […]

Categories
00 - IT Automation & Management 00 - Next-Gen Architecture, Culture & Processes agile ansible ansible tower automation Business Continuance case management configuration management DevOps Disaster Recovery playbooks Security

State of the art end to end automation in three chapters

How to achieve a sound & compelling governance handling change requests, incidents and problem tickets in a DevSecOps scenario – based on authors’ field experience with end to end automation.

Categories
Security

Securing “Layer 8”

Being a life-long techie, I’ve been working with the Open Systems Interconnection (OSI) model for over 30 years in various organisations and it is a tried and tested model on which all modern networks are based. I’ve also worked to secure each layer to ensure that communication and data transfer mechanisms conform to the well […]

Categories
HA-PROXY Red Hat Mobile Security sso Uncategorized

Protecting your Red Hat Mobile Apps with Red Hat SSO

This post demonstrates how you can protect your mobile apps and adding Open ID Connect based single sign on by integrating Red Hat Mobile with Red Hat SSO. The adapters provided by the Keycloak upstream project can be used for handing over user authentication to Red Hat SSO instead of building your own OIDC clients. […]

%d bloggers like this:
close

Subscribe to our newsletter.

Please select all the ways you would like to hear from Open Sourcerers:

You can unsubscribe at any time by clicking the link in the footer of our emails. For information about our privacy practices, please visit our website.

We use Mailchimp as our newsletter platform. By clicking below to subscribe, you acknowledge that your information will be transferred to Mailchimp for processing. Learn more about Mailchimp's privacy practices here.