Skip to content Featured links Console Support Developers Partners Redhat.com Start a trial Products Solutions Services & support Resources Red Hat & open source Featured links Console Support Developers Partners Redhat.com Start a trial Enter your keywords Contact us English Select a language 简体中文EnglishFrançaisDeutschItaliano日本語한국어PortuguêsEspañol Account Log in Welcome, Log in to your Red Hat account Log in Your Red Hat account gives you access to your member profile and preferences, and the following services based on your customer status: Customer Portal Red Hat Connect for Business Partners User management Certification Central Register now Not registered yet? Here are a few reasons why you should be:Browse Knowledgebase articles, manage support cases and subscriptions, download updates, and more from one place. View users in your organization, and edit their account information, preferences, and permissions. Manage your Red Hat certifications, view exam history, and download certification-related logos and documents. Edit your profile and preferences Your Red Hat account gives you access to your member profile, preferences, and other services depending on your customer status. For your security, if you're on a public computer and have finished using your Red Hat services, please be sure to log out. Log out Account Log in Red Hat blog Blog menu Latest postsBy productRed Hat Enterprise LinuxRed Hat InsightsRed Hat OpenShiftRed Hat Ansible AutomationRed Hat OpenStack PlatformRed Hat Cloud Storage and Data ServicesAll productsBy channelRed Hat NewsRed Hat Services SpeakCloud native computingRed Hat SecurityOpen Hybrid CloudManagement and automationAll channelsChannel: Red Hat SecurityRed Hat's most recent posts about IT security, supply chain, DevSecOps and more.Subscribe to the feed Latest postsSearch this channel Search Transport Layer Security version 1.3 in Red Hat Enterprise Linux 8August 8, 2019Hubert KarioTLS 1.3 is the sixth iteration of the Secure Sockets Layer (SSL) protocol. Originally designed by Netscape in the mid-1990’s to serve the purposes of…read full postEvolving OVALJuly 30, 2019Christopher RobinsonSecurity vulnerabilities aren't static, and neither is the way we consume vulnerability inform. So how is Red Hat keeping pace with vulnerability data trends…read full postRed Hat Certificate System achieves Common Criteria certificationJuly 24, 2019Amy FarleyRed Hat today further expands of our offerings of open technologies to power the world’s most critical workloads with the Common Criteria certification of Red…read full postWhy CVSS does not equal risk: How to think about risk in your environmentJuly 10, 2019Christopher RobinsonI’m going to come right out and say it: CVSS does NOT equal Risk (CVSS!=Risk). Anyone who thinks otherwise is mistaken and setting themselves up…read full postConsistent PKCS #11 support in Red Hat Enterprise Linux 8June 11, 2019Jakub JelenIn recent years, there have been a number of security issues taking advantage of flaws in applications and even computer processors. These opened new attack…read full postWhat you need to know about the MDS vulnerability and Red Hat VirtualizationJune 10, 2019Andrew SullivanA new series of vulnerabilities in Intel processors, known as Microarchitectural Data Sampling, or more simply MDS, was recently made public and Red Hat released…read full postUnderstanding random number generators, and their limitations, in LinuxJune 5, 2019Huzaifa SidhpurwalaRandom numbers are important in computing. TCP/IP sequence numbers, TLS nonces, ASLR offsets, password salts, and DNS source port numbers all rely on random numbers…read full postWhat Red Hat learns at our Security Symposium events: a product manager’s point of viewMay 28, 2019Mark ThackerRecently, I was asked to speak at one of Red Hat’s regional events, the Security Symposium series, which was an absolutely easy decision to make…read full postModern IT security: Sometimes caring is NOT sharingMay 14, 2019Chris RobinsonWe've gone from the castle-and-moat approach of datacenter security to a more abstract concept of security in the public cloud. Or have we? Do the…read full postUnderstanding the MDS vulnerability: What it is, why it works and how to mitigate itMay 14, 2019Jon MastersWhat's the Microprocessor Data Sampling (MDS) vulnerability? How does it work? How do you mitigate it? Read on to find out…read full post JOIN INLearn, attend, engage Latest news KPMG Automates, Accelerates and Enhances Artificial Intelligence Workflows with Red Hat OpenShift June 29, 2021 Red Hat Expands Workload Possibilities Across the Hybrid Cloud with Latest Version of OpenShift June 28, 2021 Red Hat Rewrites the Business Automation Playbook with End-to-End Kubernetes-Native Decision Management Capabilities June 21, 2021 Upcoming events Open Tour Silkeborg May 31, 2022 Open Tour test location May 31, 2022 Open Tour Copenhagen June 2, 2022 Webinars Overview of Red Hat OpenShift cloud services May 27, 2022 Services financiers : Libérez le potentiel de l’Intelligence Artificielle ! May 31, 2022 Innovators on the Line: Webinar Series May 31, 2022