In May 2025, Red Hat Enterprise Linux 10 (RHEL) shipped with the first steps toward post-quantum cryptography (PQC) to protect against attacks by quantum computers, which will make attacks on existing classic cryptographic algorithms such as RSA and elliptic curves…
Category: Red Hat Security
From if to how: A year of post-quantum reality
For the last 5 years, post-quantum cryptography (PQC) has largely been discussed as a research topic. It was a question of if—if the standards are ratified, if the algorithms perform, if the threat is real.In 2025, Red Hat changed the…
How Banco do Brasil uses hyperautomation and platform engineering to drive efficiency
At the recent OpenShift Commons gathering in Atlanta, we had the opportunity to hear from Gustavo Fiuza, IT leader, and Welton Felipe, DevOps engineer, about the remarkable digital transformation at Banco do Brasil. As the second-largest bank in Latin America,…
End-to-end security for AI: Integrating AltaStata Storage with Red Hat OpenShift confidential containers
Confidential computing represents the next frontier in hybrid and multicloud security, offering hardware-level memory protection (data in use) through technologies such as AMD SEV and Intel TDX. However, implementing storage solutions in these environments presents unique challenges that traditional approaches…
2025 Red Hat Ansible Automation Platform: A year in review
Looking back, 2025 was a year of significant milestones for Red Hat Ansible Automation Platform. From a game-changing presence at Red Hat Summit to the launch of Ansible Automation Platform 2.6, the year was filled with a number of exciting…
2025 was a year of transformative customer success with Red Hat Ansible Automation Platform
2025 has been a year of innovation in automation for customers of Red Hat Ansible Automation Platform. Here are just a few stories from customers that exemplify how Ansible Automation Platform has helped organizations turn automation into a foundation for…
Improving VirtOps: Manage, migrate or modernize with Red Hat and Cisco
Virtualization has been an evolving part of ITOps over the past several years. A variety of applications run on virtualization technology and many companies are assessing their options for new platforms to run these critical workloads. Goals include cost optimization,…
Red Hat Hybrid Cloud Console: Your questions answered
Managing a hybrid environment can feel like a balancing act between disparate sets of fragmented tools used for all the different platforms you interact with. If that sounds familiar, then your team needs integrated management across your diverse hybrid infrastructure.…
Harden your AI systems: Applying industry standards in the real world
In the last article, we discussed how integrating AI into business-critical systems opens up enterprises to a new set of risks with AI security and AI safety. Rather than reinventing the wheel or relying on fragmented, improvised approaches, organizations should…
Slash VM provisioning time on Red Hat Openshift Virtualization using Red Hat Ansible Automation Platform
Developers are accustomed to the cloud, where a virtual machine (VM) can be launched in seconds. But in many enterprises, especially in regulated industries, requesting and receiving a VM can take a staggering 60 to 90 days. This kind of…
From vision to reality: A 5-step playbook for unified automation and AI
Twenty-eight percent of businesses surveyed in the recent SP Global Market Intelligence 451 Research report, “The value of a unified automation platform,” responded that their company uses 50-100+ tools that don’t seamlessly integrate. This widespread adoption of disparate solutions, often…
AI ambitions meet automation reality: The case for a unified automation platform
IT teams are stuck between wanting to implement AI solutions across their organizations and dealing with the messy reality of increasingly complex infrastructure. Many are attempting to build their own automation solutions, cobbling together a patchwork of tools that, while…
CIS publishes hardening guidance for Red Hat OpenShift Virtualization
The Center for Internet Security® (CIS®) has officially published guidance for hardening Red Hat OpenShift Virtualization.The official publication of the new CIS Benchmark® for Red Hat OpenShift Virtualization is an important development for organizations running traditional virtual machines (VMs) alongside…
Red Hat OpenShift sandboxed containers 1.11 and Red Hat build of Trustee 1.0 accelerate confidential computing across the hybrid cloud
Red Hat is excited to announce the release of Red Hat OpenShift sandboxed containers 1.11 and Red Hat build of Trustee 1.0, marking a significant milestone in our confidential computing journey. These releases bring production-grade support for confidential containers in…
Solving tool overload, one automation step at a time
Modern IT departments are wrestling with a sprawling array of automation and operations tools, often numbering in the dozens or even hundreds. This complexity makes efficient management and integration a significant obstacle, especially as organizations accelerate their investment in hybrid…
Enhance workload security with confidential containers on Azure Red Hat OpenShift
As organizations continue to accelerate digital transformation in the cloud, customers are looking for ways to enhance safeguards for sensitive workloads, especially those in highly regulated industries. As such, confidential computing has become an increasingly prominent way to protect workloads…
Improving modern software supply chain security: From AI models to container images
The software supply chain has evolved dramatically in recent years. Today’s applications integrate countless components—from open source libraries and container images to AI models and training datasets. Each element represents a potential security risk that organizations must understand, verify, and…
Introducing Red Hat’s STIG-hardened UBI for NVIDIA GPUs on Red Hat OpenShift
Deploying cutting-edge AI in U.S. government environments can present a formidable challenge. While the power of accelerated computing is essential for modern workloads, the path to achieving an Authority to Operate (ATO) is paved with the complex and time-consuming demands…
Mitigating AI’s new risk frontier: Unifying enterprise cybersecurity with AI safety
These are exciting times for AI. Enterprises are blending AI capabilities with enterprise data to deliver better outcomes for employees, customers, and partners. But as organizations weave AI deeper into their systems, that data and infrastructure also become more attractive…
Security update: Incident related to Red Hat Consulting GitLab instance
We are writing to provide an update regarding a security incident related to a specific GitLab environment used by our Red Hat Consulting team. Red Hat takes the security and integrity of our systems and the data entrusted to us…