Back to Search Begin New Search Save Search Auto-Notify
Securing Software Factories for the Dep...
Security remains a major concern for government agencies as they adopt cloud technologies and develop applications. The Department of Homeland Security (DHS) needs a simple approach to solution delivery that incorporates security into the DevOps lifecycle.Join Brandon Cox, Staff Solutions Architect at Red Hat, and learn how security tools can be integrated to release software safely and repeatedly across all phases of the application lifecycle...
Add Favorite
Securing Your Environment with Automation
Federal agencies are now required to adopt a Zero Trust architecture and leaders must develop plans to implement the IT tools necessary to meet regulations. Implementing a Zero Trust architecture should strengthen other existing security practices and tools, it doesn't require a massive acquisition of new technologies.Red Hat has the resources to help you understand current threat environments and why security automation practices are necessar...
Add Favorite
Hardening the Cyber Quiver
Traditional approaches to information security are reactive and antiquated. In an era where technology is on-demand, we can no longer afford to be reactive, we must revolutionize all security practices while increasing our capabilities.Following on the heels of executive directives and combined guidance, we must evolve to meet the demands of cybersecurity while embracing Zero Trust and the enablers of secure infrastructures, continuous monitor...
Add Favorite
Managing Data Access Policies for Zero Trust
Zero Trust is built around the idea of moving away from a single network perimeter to a layered defense with carefully controlled gateways. This model assumes everything is running independently and is always exposed to potential threats. It is imperative for the U.S. Department of Defense to set up authentication and authorization to protect their systems and data. Users and systems will need to re-authenticate and re-authorize frequently acr...
Add Favorite
What's New in OpenShift 4.10?
Evolving technical demands and resource constraints are spurring public sector teams to embrace innovative solutions that support IT modernization, at scale.Red Hat OpenShift, an enterprise-ready Kubernetes container platform built for an open hybrid cloud strategy, provides your organization with a consistent application platform to manage hybrid cloud, MultiCloud and edge deployments.With each new iteration, OpenShift delivers unparalleled e...
Add Favorite
Accelerating Government Digitation: Upd...
Today, many public sector organizations are using dated applications to run their operations. In many cases, these applications are still critical, but not nearly as performant or cost-effective as they once were. As such, agency leaders are looking for ways to become faster and more agile so that they can continue to enable innovation, control costs, and provide new ways to consume information. How can agencies modernize the applications they...
Add Favorite
Accelerating Government Digitization: S...
Although IT leaders understand the benefits of cloud computing, there is still apprehension in the transition process due to new, persistent, and evolving thread models and compliance requirements. As such, the Biden administration issued an executive order to help federal agencies establish a zero-trust framework and effectively secure their enterprise. What impact have these measures had on public sector cybersecurity strategies? During this...
Add Favorite
Accelerating Government Digitization: A...
President Biden recently issued an executive order focusing on transforming the customer experience and providing services to public and federal agencies. Public sector leaders are trying to meet these ever-increasing expectations, while facing aging technologies, resource constraints, and lack of agility. Now, they are looking for ways to be more innovative and quickly adopt simple, seamless and secure solutions to meet the overwhelming needs...
Add Favorite
2022 Red Hat Security Symposium On Demand
Join our on-demand Security Symposium webinar series, where IT security professionals can learn from Red Hat® and Intel security experts, partners, and peers to solve security issues together as a community. This Security Symposium is an on-demand, six-session webinar series with presentations from experts discussing hybrid cloud security challenges that organizations face and solutions to tackle these challenges. During this series, we...
Add Favorite
Leveraging AIs Low Hanging Fruit to Hel...
With less money and people to do more work, healthcare organizations (HCOs) must implement artificial intelligence in the areas it shines. But what are those areas? Where can AI make a real difference today versus the aspirational uses that may not be ready for primetime? What kinds of computing environments offer the flexibility to leverage AI, which are more problematic, and how can you transition from the latter to the former if necessary?...
Add Favorite
Back to Search Begin New Search