The recent high-profile “Meltdown” and “Spectre” security event did more than expose newly-discovered problems in processor architectures dating back decades. It also exposed gaps in the Security Lifecycle Program for many organizations, possibly even in your own.
The details of this security event are already well-documented (see the original security notification in Red Hat’s Portal or this 3-minute video providing a high-level overview). So, what can your IT organization do to be better prepared for the next security event? Here are four practical actions you can take now to improve your Security Lifecycle Program.
Read the rest of "Four practical steps to improve your Security Lifecycle Program"
Today marks the completion of a full year at Red Hat. It has been an incredible year! I find myself positively challenged daily, working with some of the smartest people I have ever met -- both my colleagues within Red Hat, and the customers I get to work with. I get the privilege of being … Continue reading One Year
(Warning: Shameless Plug) I recently had the opportunity to join Gordon Haff ( Red Hat's Cloud Evangelist ) and Ellen Newlands ( Red Hat's Security and Identity Product Management) for a discussion about Identity Management and Cryptography. Check out what we had to say (audio or text) on Gordon's Cloudy Chat Podcast .
9 digits, what do they mean to me? They are a milestone, for now I am an RHCE! OK, so I'm no poet - but thankfully that is not a requirement at Red Hat! This week I took RH300, and today I passed both EX200 (RHCSA) and EX300 (RHCE). And so now, waiting for my … Continue reading An ode to 130-064-785
Presentation by Qualcomm on their experience migrating from Xen/RHEL5 to KVM/RHEV6. Straightforward advice -- plan, plan, plan, then do. Qualcomm reduced hardware deployment significantly and simplified management with the RHEV tool suite -- significant operational savings. Qualcomm made extensive use of the virt-v2v tool, but had to modify it (yay Open Source!) to make it … Continue reading Migrating Workloads to Red Hat Enterprise Virtualization – a Customer Perspective