How is Red Hat being manage and develop more secure offerings? - Course Monster Blog
Not only did the IT business appear substantially different 20 years ago, but so did product Red Hat security. Open source software was not widely used, and the majority of vendors maintained complete control and confidentiality over their product code.
Today, practically every software vendor contributes to and includes open