Red Hat Delivers Post-Quantum Security With Linux 10.2, 9.8

Red Hat is proactively defending against future threats by integrating post-quantum cryptography into Red Hat Enterprise Linux 10.2 and 9.8, establishing a new standard for foundational security within its leading enterprise Linux platform. The latest versions of the operating system also enhance confidential computing capabilities, protecting sensitive data while it is processed in memory and CPU, a critical feature for increasingly complex AI workloads. A new technology preview called “sealed images” offers enhanced security and workflow innovation through container-based deployments. “Red Hat Enterprise Linux 10.2 and 9.8 directly address the balance between the speed of AI innovation and the rigors of enterprise security,” said Gunnar Hellekson, vice president and general manager, Red Hat Enterprise Linux, Red Hat, as the company aims to deliver innovation without compromising security or scalability across hybrid cloud environments.

Post-Quantum Cryptography Fortifies RHEL Security Foundation

Recognizing the increasing sophistication of cyber threats, Red Hat has integrated National Institute of Standards and Technology standards for quantum resistance directly into the Red Hat Certificate System 11.0, enabling organizations to prepare for a post-quantum world with “quantum-resistant signatures.” This isn’t simply about future-proofing; it’s about establishing a trusted environment for increasingly sensitive workloads, particularly those leveraging confidential computing. Beyond quantum resistance, Red Hat is bolstering security at the operating system level, enhancing confidential computing capabilities to protect data both in transit and while being processed within memory and the CPU itself. This addresses a critical vulnerability, especially as artificial intelligence applications demand access to larger and more sensitive datasets.

The company is also introducing “sealed images,” a technology preview within image mode, allowing customers to sign container images at build-time, ensuring that only verified, trusted images are deployed. This is a significant step towards streamlining container-based deployments and minimizing supply chain risks. These security enhancements are coupled with improvements in threat visibility, with Red Hat and CrowdStrike customers now benefiting from access to over 2,300 new malware signatures, bolstering proactive security measures. This integration of features demonstrates a commitment to building a durable and secure operating system platform, unifying IT operations across hybrid cloud environments while prioritizing data protection and operational resilience.

AI-Driven Automation Streamlines RHEL Upgrades & Management

Red Hat is addressing the increasing complexity of modern IT infrastructure with automation features embedded within the latest releases of Red Hat Enterprise Linux, versions 10.2 and 9.8. Organizations strive to adopt advancements like artificial intelligence and containerization, but maintaining system reliability and security presents a growing challenge. Red Hat aims to bridge this gap through intelligent operational tooling. A key component of this strategy is the integration of Red Hat Ansible Certified Content and a new Red Hat Enterprise Linux upgrade system role, designed to automate complex in-place upgrades. This approach packages accumulated best practices into what the company describes as a “fail fast then iterate” methodology, minimizing downtime and reducing the potential for human error during critical system updates. Beyond simplifying upgrades, Red Hat is leveraging AI to enhance Linux management through initiatives like the Model Context Protocol.

MCP servers, currently in developer preview for Red Hat Satellite and Lightspeed, allow AI agents to securely access real-time Linux data, enabling administrators to manage systems using natural language and automated workflows, all within defined safety parameters. The open-source agent, goose, further expands this capability by connecting multiple MCP servers into a unified command-line assistant, facilitating a transition from manual troubleshooting to high-velocity, automated infrastructure management. These advancements extend to image-based workflows, with enhancements to image mode providing greater consistency in building, deploying, and managing Red Hat Enterprise Linux using container technologies, ultimately aiming to contain system drift and maintain control over maintenance schedules.

Red Hat Enterprise Linux 10.2 and 9.8 directly address the balancing act between the speed of AI innovation and the rigors of enterprise security, turning complex operational hurdles into automated, repeatable processes.

Gunnar Hellekson, vice president and general manager, Red Hat Enterprise Linux, Red Hat

Image Mode Enhancements Accelerate Container Workflows

The company recognizes a widening gap between traditional system reliability and the demands of emerging technologies like artificial intelligence and faster, container-based image workflows, and is responding with tools designed to bridge that divide. This focus on image-based workflows is intended to accelerate innovation while upholding stringent security standards, a balance increasingly vital for organizations adopting cloud-native architectures. The company’s efforts extend to automating traditionally manual processes. Pre-downloading updates via image mode further empowers administrators to manage large-scale deployments with greater precision, allowing them to control patch application timing and optimize system uptime, ultimately reducing operational friction.

By integrating post-quantum cryptography and AI-driven upgrade tools, we’re helping our customers confidently push into computing’s future with defenses against emerging threats and the ability to consistently and reliably scale AI workloads across the hybrid cloud.

Gunnar Hellekson, vice president and general manager, Red Hat Enterprise Linux, Red Hat
Ivy Delaney

Ivy Delaney

We've seen the rise of AI over the last few short years with the rise of the LLM and companies such as Open AI with its ChatGPT service. Ivy has been working with Neural Networks, Machine Learning and AI since the mid nineties and talk about the latest exciting developments in the field.

Latest Posts by Ivy Delaney: