Four practical steps to improve your Security Lifecycle Program

The recent high-profile “Meltdown” and “Spectre” security event did more than expose newly-discovered problems in processor architectures dating back decades. It also exposed gaps in the Security Lifecycle Program for many organizations, possibly even in your own.

The details of this security event are already well-documented (see the original security notification in Red Hat’s Portal or this 3-minute video providing a high-level overview). So, what can your IT organization do to be better prepared for the next security event? Here are four practical actions you can take now to improve your Security Lifecycle Program.

Read the rest of "Four practical steps to improve your Security Lifecycle Program"

One Year

Today marks the completion of a full year at Red Hat.  It has been an incredible year!  I find myself positively challenged daily, working with some of the smartest people I have ever met -- both my colleagues within Red Hat, and the customers I get to work with.  I get the privilege of being … Continue reading One Year

Cameo on Gordon Haff’s Cloudy Chat Podcast

(Warning: Shameless Plug) I recently had the opportunity to join Gordon Haff ( Red Hat's Cloud Evangelist ) and Ellen Newlands ( Red Hat's Security and Identity Product Management) for a discussion about Identity Management and Cryptography.  Check out what we had to say (audio or text) on Gordon's Cloudy Chat Podcast .

Migrating Workloads to Red Hat Enterprise Virtualization – a Customer Perspective

Presentation by Qualcomm on their experience migrating from Xen/RHEL5 to KVM/RHEV6. Straightforward advice -- plan, plan, plan, then do. Qualcomm reduced hardware deployment significantly and simplified management with the RHEV tool suite -- significant operational savings. Qualcomm made extensive use of the virt-v2v tool, but had to modify it (yay Open Source!) to make it … Continue reading Migrating Workloads to Red Hat Enterprise Virtualization – a Customer Perspective