Making today very exciting in Linux 7.1 merge window land was a pull request being sent out for introducing the new, modern NTFS file-system driver. Linus Torvalds has yet to comment if he's going to merge the new driver but it looks like it's ready for providing a better Linux NTFS experience over the current NTFS3 driver that was upstreamed by Paragon Software a few years ago and hasn't seen too much feature progress...
Confidential computing is a complex topic, and often requires a deep understanding of hardware, kernel, and orchestration layers. The generic definition is "protecting data in use," but it's more than that. It's about verifying that the environment we are running has not been tampered with, that we don't need to trust Kubernetes administrators and the platform or even hardware we are running our application on.Confidential computing is a major pillar when it comes to data sovereignty and the Red Hat zero trust security principle. Confidential containers aims to bring this technology at the Kub
At MWC 2026, Telstra announced a major step forward in its journey towards building one of the world’s most advanced autonomous networks in collaboration with Red Hat and other industry partners. Telstra executed a proof-of-concept within a live telecommunication (telco) cloud environment to autonomously detect and resolve an unplanned infrastructure outage by shifting critical network applications to healthy infrastructure in just minutes. The result shows how a multivendor, AI-native architecture can enable self-healing operations at scale. Central to this exciting new capability are the o
In our previous 3 articles, we laid the groundwork for a protected Model Context Protocol (MCP) ecosystem by analyzing the current threat landscape, implementing robust authentication and authorization, and exploring critical logging and runtime security measures. These focused on who can access what, and how to monitor those interactions. Now, we'll shift the focus to the physical and virtual environments in which these systems live. Of course, security-focused development is only half the battle. Deploying an MCP server with weak security protections can negate even the most robust code, as
InformationWeek - Red Hat CIO Marco Bill: Resource control is key for AI sovereigntyRed Hat CIO, Marco Bill, explains why a comprehensive inventory of data, infrastructure, and architecture is essential for maintaining security, ensuring regulatory compliance, and navigating the complexities of a globally interconnected AI ecosystem. Learn more Navigating the Mythos-haunted world of platform securityAdvanced AI models like Claude Mythos are revolutionizing vulnerability discovery, but they also risk industrializing cyberattacks. This Red Hat blog explores how context and curation remain the
Valve and CodeWeavers have just released Proton 11.0 Beta as their first beta milestone for this software that powers Steam Play now rebased against upstream Wine 11.0...
The extensible scheduler "sched_ext" code for allowing Linux scheduling behavior to be defined via BPF programs is seeing some useful improvements with the in-development Linux 7.1 kernel...
Pages