님, 안녕하십니까?
Red Hat 계정에 로그인
아직 등록하지 않으셨습니까? 등록해야 하는 이유:
- 한 곳에서 기술 자료 문서를 탐색하고, 지원 사례와 서브스크립션을 관리하고, 업데이트를 다운로드 할 수 있습니다.
- 조직 내의 사용자를 보고, 계정 정보, 기본 설정 및 권한을 편집할 수 있습니다.
- Red Hat 자격증을 관리하고 시험 내역을 조회하며 자격증 관련 로고 및 문서를 다운로드할 수 있습니다.
Red Hat 계정으로 회원 프로필, 기본 설정 및 자신의 고객 상태에 따른 기타 서비스에 액세스할 수 있습니다.
보안을 위해, 공용 컴퓨터 사용 중에 Red Hat 서비스 이용이 끝난 경우 로그아웃하는 것을 잊지 마십시오.
로그아웃Red Hat blog
Blog menu
In accordance with recent federal mandates, and in pursuit of innovative and powerful solutions, the emphasis on implementing open source software in the federal government has increased. While the government's digital transformation marks an exciting chapter in government technology, it can also introduce new cyber security challenges.
That’s why we created Red Hat’s Defense in Depth event – to give the best minds in government IT security an opportunity to come together to discuss solutions to these challenges.
This year, during our fourth annual Defense in Depth event, government employees, contractors and Red Hat partners will gather in Tysons Corner, Va. to discuss how open source can help accelerate innovation in government IT, and discuss best practices for open source security. Red Hat certified engineers, product managers and solution architects will also be on site to answer specific questions and to discuss government IT’s evolving security needs.
The 2016 Red Hat Defense in Depth event will feature break out sessions and speakers, including:
-
Delivering trusted clouds with software-defined architectures: Steve Orrin, Intel
-
Securing the open source supply chain: Josh Bressers, Red Hat
-
Extending the FedRAMP security boundary to the premise: John Keese, CSRA
-
Triggering insider threats using Auditd - Using the Linux audit subsystem to meet insider threats: Mark St. Laurent, Praxis
-
Emerging tech show and tell: application whitelisting: Steve Grubb, Red Hat
-
open sourced: NSA System Integrity Management Platform (SIMP): Trevor Vaughan, Onyx Point
-
Automating DoD STIG compliance with OpenSCAP: Martin Preisler and Robin Price, Red Hat
-
A proactive approach to detecting advanced threats in Linux: Victor Martinez, Forcepoint
This promises to be a premier event on government IT security and how open source software can help address those challenges.
Defense in Depth will be held on Oct. 6, 2016, in Tysons Corner, Va. Visit the official event site for more details and to register.