In the modern world of IT application deployment, server virtualization is a commonly used term. But what exactly is server virtualization and is it right for your business?
A new vulnerability in the core runc container code could potentially enable a malicious container to get access to the host operating system. Major vendors and cloud providers are already pushing out patches, but there are other things users can do to limit risk.
The open-source Istio service mesh technology provides many security options, though a number of critical controls are not turned on by default.
Google is working to advance the next stage of cloud cybersecurity with an approach known as Confidential Computing and the open-source Asylo project which makes it easier to implement.
Red Hat is expanding its developer tools portfolio with a commercially supported distribution of the open-source Eclipse Che project, providing a Kubernetes-native approach to application development.
HackerRank surveyed over 71,000 developers to better understand how developers are working today, providing multiple insights into the programming languages and frameworks that are most in demand.
As organizations increasingly choose to adopt cloud native Kubernetes technologies, there is a corresponding need to make it easier to deploy and manage storage.
New release of the Firefox web browser makes it easier for users to configure controls that can help to protect online privacy.
The Nginx Application Platform is expanding, with new API management capabilities and a future direction to enable service mesh.
High-level vulnerabilities in a pair of open-source tools reveals risks in package management infrastructure.
The StackRox Container Security Platform 2.4 update includes enhanced capabilities to help organizations better secure Kubernetes cloud-native deployments.
Red Hat's competitive effort to Docker containers hits a major milestone with the release of Podman 1.0, which looks to provide improved performance and security for containers.
The first major milestone update to the open-source Metasploit Framework since 2011 is now available, making it easier for security researchers to test cyber-security defenses against exploit
Red Hat brings nested workflow capabilities to Ansible Tower, enabling more complex IT operations automation.
Simply deploying containers with a managed service isn't enough. Learn top tips to keep Kubernetes container deployments safe and secure.
As open source software continues to become increasingly important for enterprise application development, there is a need to help fund developer efforts.
NEWS ANALYSIS: Though Mozilla was ready to give up on its Thunderbird email client in 2012, 2019 could well be a breakout year for the open-source effort as staffing is set to increase and a roadmap for innovation is in place.
VIDEO: Arpit Joshipura, General Manager for Networking at the Linux Foundation explains how the LF Networking group is helping to bring the networking industry together.
Containers can get applications running quickly, but that convenience comes with a number of security concerns. Here are the container security vendors that can help.
2018 saw six new major Linux kernel releases and a substantial amount of innovation to boost the open source server operating system.