Avatar photo
By: Gabriela Machado

January 27, 2025 10:29 pm

779 views

Ensuring Compliance with Emerging Regulations: Modernize Your SAP Landscape with Confidence

This blog was written in a collaboration between Fujitsu, Intel and SUSE. Cybersecurity has never been a more pressing issue for modern business. Managing and securing increasingly vast volumes of information and juggling ever more complex IT infrastructures can seem like an uphill battle. This can strain traditional systems and hinder a company's ability to […]

Read More


Avatar photo
By: Kevin Ayres

January 24, 2025 1:35 am

337 views

SUSE Achieves AWS ISV Security Software Competency

SUSE is now an AWS Security Competency Partner  SUSE achieves AWS Security Competency, validating its expertise in cloud native security with SUSE Security (NeuVector). What is an ISV Software Competency? The AWS Competency program is designed to highlight top-performing partners who have demonstrated exceptional expertise and customer success. Achieving this status involves a rigorous evaluation […]

Read More


Avatar photo
By: Ivan Tarin

January 9, 2025 10:43 pm

354 views

Understanding and Maintaining Compliance in Container Environments

Containers help enterprises build, deploy and manage applications in a scalable and efficient way. Their flexibility is part of what has made them so effective but it also introduces compliance and security challenges, particularly in regulated industries.  Navigating these compliance-related challenges often requires the use of specialized container security solutions. In this article, we’[…]

Read More


Avatar photo
By: Giang Pham

December 10, 2024 6:36 pm

585 views

How To Advance Container Network Security in Kubernetes

As enterprises work to innovate quickly and adapt to rapidly changing demands, they’ve come to rely heavily on containers. Container technology offers the flexibility, efficiency and scalability needed for the modern IT infrastructure.  However, the shift from traditional perimeter security to network security within Kubernetes clusters has given rise to new challenges. Securing […]

Read More


Avatar photo
By: Ivan Tarin

November 13, 2024 7:10 pm

1,141 views

Empowering Secure, Self-Service Kubernetes with the SUSE® Rancher Prime Application Collection at Kubecon NA 2024

SUSE® Rancher Prime Application Collection was first released at KubeCon Paris in March 2024. It has quickly become a key resource for organizations that want secure, enterprise-ready applications. It gives platform engineers, DevOps teams, and developers safe, self-service access to curated software that is made for Kubernetes environments. The Application Collection makes it easier for […]

Read More


Avatar photo
By: Stacey Miller

November 12, 2024 12:30 pm

3,429 views

Introducing SUSE AI: A Secure, Extensible Deploy and Runtime Platform for GenAI

Artificial intelligence is evolving rapidly. Businesses are constantly seeking open source solutions that offer flexibility, choice, and security. SUSE has always been a leader in this area, and we are now bringing these same qualities to SUSE AI.  We are excited to announce the launch of SUSE AI - a secure, private and enterprise […]

Read More


Avatar photo
By: Kevin Ayres

November 11, 2024 6:51 pm

819 views

Send SUSE Security (NeuVector) events to AWS CloudTrail Lake

Guest writer: Dominik Wombacher, Sr. Partner Solutions Architect, AWS In this Blog, you'll learn how to send SUSE Security (NeuVector) events and reports to AWS CloudTrail Lake . Storing alert data immutably and securely for years is a common use-case. This helps to fulfill audit and compliance requirements and allows access to the ingested data at […]

Read More


Avatar photo
By: Ivan Tarin

October 31, 2024 9:43 pm

738 views

Integrating Zero Trust Container Security in CI/CD Pipelines: Best Practices and Tools

Containers have been a massive step forward for cloud native applications, ensuring companies can reduce the impact on end users while keeping new features, bug fixes and patches continuously up to date on a far more efficient infrastructure. At the same time, the fast-paced nature of CI/CD pipelines into containers, while great for agility, also […]

Read More


Avatar photo
By: Ivan Tarin

October 29, 2024 6:27 pm

734 views

Strengthen Your Container Runtime Security: A Deep Dive Into Cloud Native Protection

Container runtime security is a vital aspect of the shift towards cloud native architectures. The container runtime phase is the backbone of agile application deployment and resource management, however, it is also, arguably, the most vulnerable stage of a container’s lifecycle. When containers execute their operations, Cybercriminals can easily exploit vulnerabilities, misconfigurations or even […]

Read More