Back to Search Begin New Search Save Search Auto-Notify
F5 Red Hat Tech on Tap
APIs are the lifeblood of the internet today. Everything from booking flights to reading your daily newsfeeds is all made possible by the growth of data sharing using Application Programming Interfaces (APIs). With the growth of modern applications, developers often unintentionally leak sensitive datasets. The proliferation of APIs has marked them as a prime target for malicious actors and nation-states leaving the DoD and the War Fighter vuln...
Add Favorite
F5 Red Hat Tech on Tap
APIs are the lifeblood of the internet today. Everything from booking flights to reading your daily newsfeeds is all made possible by the growth of data sharing using Application Programming Interfaces (APIs). With the growth of modern applications, developers often unintentionally leak sensitive datasets. The proliferation of APIs has marked them as a prime target for malicious actors and nation-states leaving the DoD and the War Fighter vuln...
Add Favorite
Kubernetes Cluster Security & Management
Red Hat Advanced Cluster Management (ACM) and Advanced Cluster Security (ACS) help simplify Kubernetes security and management in enterprise IT environments. As the use of containers and Kubernetes rises to facilitate application modernization, IT teams can utilize Red Hat ACM to quickly and effectively deploy and control multiple Kubernetes clusters. Red Hat ACS offers protection for your essential applications across the software lifecycle b...
Add Favorite
Mind the Gap: The Importance of Persona...
As public sector teams incorporate the use of container-based technologies to solve technical challenges, the urgency to close skills gaps related to these solutions becomes apparent. How do our operations teams support this new technology? Why should our developers adopt it? How should they work together?Red Hat OpenShift, an enterprise-ready Kubernetes platform, provides teams with a consistent solution for managing hybrid cloud, MultiCloud...
Add Favorite
F5 Red Hat Tech on Tap
APIs are the lifeblood of the internet today. Everything from booking flights to reading your daily newsfeeds is all made possible by the growth of data sharing using Application Programming Interfaces (APIs). With the growth of modern applications, developers often unintentionally leak sensitive datasets. The proliferation of APIs has marked them as a prime target for malicious actors and nation-states leaving the DoD and the War Fighter vuln...
Add Favorite
F5 Red Hat Tech on Tap
APIs are the lifeblood of the internet today. Everything from booking flights to reading your daily newsfeeds is all made possible by the growth of data sharing using Application Programming Interfaces (APIs). With the growth of modern applications, developers often unintentionally leak sensitive datasets. The proliferation of APIs has marked them as a prime target for malicious actors and nation-states leaving the DoD and the War Fighter vuln...
Add Favorite
USDA Cybersecurity Expo 2023
Red Hat will be attending the USDA Cybersecurity Expo from October 3 - 4 virtually. The 2023 USDA Cybersecurity Expo will provide its active participants with tactics to meet future challenges and trends in cybersecurity. Red Hat is the leader in open source innovation and one of the biggest contributors to the community. With Red Hat, public sector IT departments can deliver more value each year with a smaller budget and solve everyday challe...
Add Favorite
The Definitive RHEL 9 Hands-On Lab
As your infrastructure extends from the datacenter to the cloud and reaches the network edge, Red Hat Enterprise Linux (RHEL) 9 serves as a dependable and scalable foundation that your U.S. Department of Homeland Security (DHS) team can trust. RHEL is the world's leading enterprise Linux platform that provides a secure, consistent and intelligent operating foundation for modern IT and enterprise hybrid cloud deployments. Red Hat demonstrated h...
Add Favorite
F5 Red Hat Tech on Tap
APIs are the lifeblood of the internet today. Everything from booking flights to reading your daily newsfeeds is all made possible by the growth of data sharing using Application Programming Interfaces (APIs). With the growth of modern applications, developers often unintentionally leak sensitive datasets. The proliferation of APIs has marked them as a prime target for malicious actors and nation-states leaving the DoD and the War Fighter vuln...
Add Favorite
DoD Modernization Through Automation: L...
Attendees learnded how to harness the power of Red Hat automation and Linux technologies to drive modernization efforts within the U.S. Army Corps of Engineers (USACE). These powerful tools can not only automate routine tasks but also enforce the security standards mandated by the Defense Information Systems Agency (DISA). This hands-on on-demand training provided the ability to enhance security posture while streamlining operational processes...
Add Favorite
Back to Search Begin New Search