The idea of software vulnerabilities are almost orthogonal to the concept of management. The very act of exploiting software security holes goes against anything and everything "management" stands for. But it is a sad truth of our time that software vulnerabilities exist, will continue to be found and aren't likely to go away any time soon.
That's why DevSecOps has become a discipline, and why vulnerability management has risen as a way to deal with the ever rising tide of security holes that seem to come from every possible vector. At Red Hat, we offer Red Hat Advanced Cluster Security for Kubernetes as a way to manage container images and their related issues. Red Hat Advanced Cluster Management is included with OpenShift Platform Plus.
Red Hat's Chris Porter joins Andrew and Jonny in this first episode of the Ask an OpenShift Admin security series to discuss Vulnerability Management.
Tune in next week for part two of this new security series!
About the author
More like this
Introducing OpenShift Service Mesh 3.2 with Istio’s ambient mode
From if to how: A year of post-quantum reality
Data Security 101 | Compiler
AI Is Changing The Threat Landscape | Compiler
Browse by channel
Automation
The latest on IT automation for tech, teams, and environments
Artificial intelligence
Updates on the platforms that free customers to run AI workloads anywhere
Open hybrid cloud
Explore how we build a more flexible future with hybrid cloud
Security
The latest on how we reduce risks across environments and technologies
Edge computing
Updates on the platforms that simplify operations at the edge
Infrastructure
The latest on the world’s leading enterprise Linux platform
Applications
Inside our solutions to the toughest application challenges
Virtualization
The future of enterprise virtualization for your workloads on-premise or across clouds