In the world of cybersecurity, vulnerability management is frequently a collaborative effort between vendors, software maintainers, and customers. It's a continuous journey of discovery, prioritization, and remediation that we embark on together. Each challenge that we face provides valuable opportunities to refine our strategies and strengthen our collective security posture.Based on our work with customers, we've identified a few common areas where we can all “level up” our vulnerability management game. Let's explore these patterns and recommendations.Beyond the base score: The art of s
Europe stands at a critical digital crossroads. As the European Commission shapes the European Open Digital Ecosystem Strategy, the conversation has shifted toward a vital objective: achieving true digital sovereignty while driving global competitiveness. For decades, Red Hat has catalyzed open source adoption across the European Union. We advocate for ‘default-to-open’ EU policies because they help unlock Europe’s full potential. From improving citizen public services with the València City Council and ITZBund to modernizing IT for major European entities such as BBVA, Volkswagen and
The Linux MultiMediaCard "MMC" subsystem was set to see some new hardware support, optimized support for secure erase/trim on some eMMCs, and a variety of other improvements. But all of the MMC changes are rejected and will be for the duration of the Linux 7.0 cycle due to an apparent lack of testing and vetting via linux-next that led Linus Torvalds to calling it "complete garbage" and "untested crap"...