Skip to content Featured links Console Support Developers Partners Redhat.com Start a trial Products Solutions Services & support Resources Red Hat & open source Featured links Console Support Developers Partners Redhat.com Start a trial Enter your keywords Contact us English Select a language 简体中文EnglishFrançaisDeutschItaliano日本語한국어PortuguêsEspañol Account Log in Welcome, Log in to your Red Hat account Log in Your Red Hat account gives you access to your member profile and preferences, and the following services based on your customer status: Customer Portal Red Hat Connect for Business Partners User management Certification Central Register now Not registered yet? Here are a few reasons why you should be:Browse Knowledgebase articles, manage support cases and subscriptions, download updates, and more from one place. View users in your organization, and edit their account information, preferences, and permissions. Manage your Red Hat certifications, view exam history, and download certification-related logos and documents. Edit your profile and preferences Your Red Hat account gives you access to your member profile, preferences, and other services depending on your customer status. For your security, if you're on a public computer and have finished using your Red Hat services, please be sure to log out. Log out Account Log in Red Hat blog Blog menu Latest postsBy productRed Hat Enterprise LinuxRed Hat InsightsRed Hat OpenShiftRed Hat Ansible AutomationRed Hat OpenStack PlatformRed Hat Cloud Storage and Data ServicesAll productsBy channelRed Hat NewsRed Hat Services SpeakCloud native computingRed Hat SecurityOpen Hybrid CloudManagement and automationAll channelsChannel: Red Hat SecurityRed Hat's most recent posts about IT security, supply chain, DevSecOps and more.Subscribe to the feed Latest postsSearch this channel Search Embedded Vulnerability Detection command line toolFebruary 5, 2014Red HatThe Victims project is a Red Hat initiative that aims to detect known vulnerable dependencies in Java projects and deployments. Our initial focus was Java…read full postJava deserialization flaws: Part 2, XML deserializationJanuary 23, 2014Red HatAll classes which implement the java.io.Serializable interface can be serialized and deserialized, with Java handling the plumbing automatically. In the first part of this two-part series, we look …read full postTLSv1.1 and TLSv1.2 now available in RHELDecember 11, 2013Red HatIn the mid-1990s Secure Sockets Layer (SSL) was introduced for securing network communications. The released version, version 2, contained several security holes and was quickly updated to…read full postAutomated auditing the system using SCAPNovember 13, 2013Jan LieskovskyWe live in an electronic age. Nowadays, more and more manifestations of human identity are available via electronic media. Besides advantages, this facility brings challenges…read full postRed Hat Joins OpenDNP3 Open Source Community to Help Address Utility Industry Cybersecurity ConcernsNovember 4, 2013Red Hat Utilities TeamIn February 2013, President Obama signed an executive order to help increase the cybersecurity of public utilities across the United States by protecting their critical…read full postDebugging stack protector failuresOctober 23, 2013Florian WeimerGCC upstream and Fedora 19 recently improved the stack smashing protector. Each time we add more security instrumentation, we also uncover some previously hidden bugs…read full postA Brief History of CryptographyAugust 14, 2013Huzaifa SidhpurwalaCryptology is a young science. Though it has been used for thousands of years to hide secret messages, systematic study of cryptology as a science (and perhaps…read full postTransport Layer SecurityJuly 24, 2013Red HatTLS or Transport Layer Security is one of the most widely used protocols on the Internet. A replacement for SSL, when you visit a website…read full postAn Introduction to Cryptographic Authentication and EncryptionJuly 17, 2013Red HatIf you are on the Internet then you more than likely have used encryption whether you knew it or not. Logging into the Gmail™ webmail…read full postNew Study Highlights Growth of Open Source as Development and Deployment Model for Public Sector ITApril 17, 2013The Red Hat Public Sector TeamRecently, we've partnered with the folks at Tech Target to survey a group of public sector IT decision makers to uncover some of the priorities…read full post JOIN INLearn, attend, engage Latest news KPMG Automates, Accelerates and Enhances Artificial Intelligence Workflows with Red Hat OpenShift June 29, 2021 Red Hat Expands Workload Possibilities Across the Hybrid Cloud with Latest Version of OpenShift June 28, 2021 Red Hat Rewrites the Business Automation Playbook with End-to-End Kubernetes-Native Decision Management Capabilities June 21, 2021 Upcoming events Open Tour Silkeborg May 31, 2022 Open Tour test location May 31, 2022 Open Tour Copenhagen June 2, 2022 Webinars Services financiers : Libérez le potentiel de l’Intelligence Artificielle ! May 31, 2022 Innovators on the Line: Webinar Series May 31, 2022 Red Hat Innovators on the Line: Asian Development Bank June 6, 2022