Cybersecurity

Ansible-Lint in Air-Gapped Environments: Offline Setup Guide

Using Ansible-Lint in Air-Gapped Environments: Best Practices and Troubleshooting When managing infrastructure in air-gapped environments—where systems are isolated from the internet for security purposes—teams often encounter challenges related to software dependencies that require online access.

Continue reading

Coursera Back-End Infrastructure: Servers, Secure APIs and Data

Back-End Infrastructure: Servers, Secure APIs and Data on Coursera What you’ll learn Evaluate the integral role of data protection in securing back-end infrastructure and APIs.

Continue reading

Ansible 2.17.0-rc1: Elevating Automation with ‘Gallows Pole’

Introduction In the rapidly evolving world of IT, efficiency and security are not just aspirations but necessities.

Continue reading

Luca Berton presents the Latest Book at the London Book Fair 2024, "Red Hat Ansible Automation Platform"

In the vibrant, buzzing halls of the London Book Fair 2024, amidst the myriad of literary and technological marvels, one name stood out with a particularly resonant buzz: Luca Berton.

Continue reading

RHSB-2024–001 Leaky Vessels — runc — (CVE-2024–21626)

Introduction Red Hat has identified a critical vulnerability in runc, a key component of container infrastructure, which facilitates container escapes, potentially allowing attackers unauthorized access to the host operating system from within a container.

Continue reading

Streamline Vulnerability Scanning with Ansible and Terrapin Scanner

Introduction In the rapidly evolving landscape of cybersecurity, regular vulnerability assessments are essential to identify and mitigate potential security risks.

Continue reading

Luca Berton's Tech Podcast: Insights on YouTube and Spotify

Introduction In the vast landscape of technology podcasts, one name stands out for its captivating insights and engaging conversations—Luca Berton.

Continue reading

Browser in a Browser Proxy with Ansible Automation

A browser in a browser proxy offers an innovative way to secure online browsing by encapsulating a browser session within another, effectively isolating sensitive activities.

Continue reading