This year, Red Hat Summit 2026 is headed to Atlanta for an experience that’s more hands-on and interactive than ever! Whether you’re a long-time attendee or joining us for the first time, this year’s event promises new ways to move from “what if” to “what’s next.” We’ve designed 2026’s program to help every attendee—from IT leaders to hands-on practitioners—sharpen their skills and bring open source innovation to life.Explore the expo hall The expo hall is your hub for 1-on-1 access to the experts building the future of IT. This year, we’re introducing lightning labs:
The preview release of Claude Mythos presents a massive challenge for IT security experts, as well as an opportunity (at least for the organizations that can afford it). Mythos represents a new category of frontier model that can not only identify complex memory safety issues and logic flaws hidden in legacy code but also exploit them in increasingly sophisticated ways. This dramatically compounds and expands the outsize role currently played by AI-driven vulnerability scanning both in corporate IT security teams and open source communities. Mythos, however, represents more than a deluge of AI
Model Context Protocol (MCP) servers often execute code or commands as instructed by an AI agent, exposing them to various risks. To help mitigate these risks, you should implement strict runtime security measures to contain what the server can do and to sanitize what it processes.As discussed in our previous blog post, MCP security: Implementing robust authentication and authorization, an important aspect of MCP security is the ability to monitor autonomous agent behaviour and identify potential threats in real-time. By maintaining a detailed audit trail of tool invocations, authentication ev