Tags » Red Hat

CVE-2015-7837: RHEL UEFI Secure Boot

Red Hat Enterprise Linux UEFI Secure Boot erweiterte Rechte https://t.co/beBpphGD0v

— Team Security (@security_de) September 20, 2017

Vulnerability ID 106841
Red Hat Enterprise Linux UEFI Secure Boot privilege escalation…

209 more words

Where to Draw the Line

Don’t let the title of this post fool you. This isn’t about setting boundaries. If anything, it’s about breaking through them. In this case, I’m talking about redefining the Creative Strategy + Design team’s illustration style—specifically, the way we handle our people illustrations. 675 more words

Red Hat, DataTaag to discuss open source tech and digital transformation

Red Hat, a provider of open source solutions along with Data TAAG Technologies is set to host a workshop focused on digital transformation.
According to both companies, the event will look into best practices and innovations on how organisations today can optimise open source technologies in… 8 more words

Defense in Depth is cool, and you should attend on October 3rd

For five years now, Red Hat and Intel have hosted a small, but very cool security conference called “Defense in Depth (DiD)” in Tyson’s Corner, VA. 318 more words

Cyber

2018 Red Hat Innovation Award Nominations Now Open

One of the most exciting things we do each year at Red Hat is to recognize the transformative projects and outstanding results achieved by our customers from around the world, through the… 307 more words

Red Hat

“Welcome to Raleigh, Y’all”

In our Raleigh, NC office lobby, we have what we call The Open Gallery, which features a rotating series of exhibits for associates, visitors, and the local community. 408 more words

Setting Up A NTP Server - Linux

The Network Time Protocol (NTP) is a networking protocol for time and date synchronization between servers/computers. The time will vary depending on network latency however with tens of milliseconds over the Internet and almost one millisecond on LAN. 373 more words

Linux