Language Selection

English French German Italian Portuguese Spanish

Red Hat on Microservices and Security

Filed under
Red Hat
Security
  • The State of Microservices

    During the fall of 2017, we conducted a microservices survey with our Red Hat JBoss Middleware and Red Hat OpenShift customers. From this, we were able to discover how these customers are using microservices to their advantage, what they see as some of the major benefits, what challenges exist and how to overcome them and how microservices can give respondents a competitive advantage. While these statistics are based off of a specific group of Red Hat customers, these findings give a good sense of the overall attitude toward microservices adoption and implementation. Read on to learn more about these findings.

  • What OpenShift Online and Dedicated customers should know about Meltdown and Spectre

    This past week, the technology world became aware of three significant security threats that could be used to allow cybercriminals to steal valuable data from an affected computer system. Together, these three bugs are commonly known as “Spectre” and “Meltdown” – a technical discussion of these vulnerabilities can be found here, and a non-technical explanation of the key facts is here.

  • Security updates for Thursday
  • Intel Releases Linux CPU Microcodes for Processors Going Back Two Decades

More in Tux Machines

today's howtos

Kraft Version 0.82

A new release of Kraft, the Qt- and KDE based software to help to organize business docs in small companies, has arrived. A couple of days ago version 0.82 was released. It mainly is a bugfix release, but it also comes with a few new features. Users were asking for some new functions that they needed to switch to Kraft with their business communication, and I am always trying to make that a priority. The most visible feature is a light rework of the calculation dialog that allows users to do price calculations for templates. It was cleared up, superflous elements were finally removed and the remaining ones now work as expected. The distinction between manual price and calculated price should be even more clear now. Time calculations can now not only done in the granularity of minutes, as this was to coarse for certain usecases. The unit for a time slice can now be either seconds, minutes or hours. Read more

Ubuntu 18.10 is Released. Here’s What’s New

Ubuntu 18.10 code named ‘Cosmic Cuttlefish’ is released after 6 months of development efforts. The latest release of Ubuntu comes with some major feature updates and latest software. This release is a short term release and would be receiving updates and security fixes till July 2019. Read more

Security: ZDNet/CBS FUD, WiFi4EU, and Krack Wi-Fi

  • Open source web hosting software compromised with DDoS malware [Ed: CBS hired Catalin Cimpanu for him to have a broader platform with which to associate "Open Source" with security issues (does he say "proprietary" when it's proprietary, too?). Microsoft has long financed efforts to associate FOSS/copyleft with security issues and stigmatise it with licensing terror.]
  • Commission tried to hide details of 'WiFi4EU' glitch

    The European Commission has tried to hide information related to technical problems its free wifi fund portal suffered, by claiming that it was "out of scope".

    It released documents to EUobserver following an access to documents request - but heavily redacted some of the key papers.

    However, one of the documents has been leaked and published online. A comparison between the leaked version and the one released by the commission clearly shows that the commission went too far with its redactions.

  • The Flawed System Behind the Krack Wi-Fi Meltdown

    "If there is one thing to learn from this, it's that standards can't be closed off from security researchers," says Robert Graham, an analyst for the cybersecurity firm Erratasec. "The bug here is actually pretty easy to prevent, and pretty obvious. It's the fact that security researchers couldn't get their hands on the standards that meant that it was able to hide."

    The WPA2 protocol was developed by the Wi-Fi Alliance and the Institute of Electrical and Electronics Engineers (IEEE), which acts as a standards body for numerous technical industries, including wireless security. But unlike, say, Transport Layer Security, the popular cryptographic protocol used in web encryption, WPA2 doesn't make its specifications widely available. IEEE wireless security standards carry a retail cost of hundreds of dollars to access, and costs to review multiple interoperable standards can quickly add up to thousands of dollars.