Avatar photo
By: Jen Canfor

December 19, 2024 4:24 pm

191 views

Private AI for the Enterprise: Where Data Security Meets Innovation

Security continues to be a top concern for enterprises as artificial intelligence (AI) becomes an integral part of everyday business applications. To protect confidential data, enterprises seek private AI solutions, which allow enterprises to use AI without exposing sensitive information.  Unlike most SaaS-based AI tools, private AI infrastructures and solutions provide enhanced data security […]

Read More


Avatar photo
By: Giang Pham

December 10, 2024 6:36 pm

281 views

How To Advance Container Network Security in Kubernetes

As enterprises work to innovate quickly and adapt to rapidly changing demands, they’ve come to rely heavily on containers. Container technology offers the flexibility, efficiency and scalability needed for the modern IT infrastructure.  However, the shift from traditional perimeter security to network security within Kubernetes clusters has given rise to new challenges. Securing […]

Read More


Avatar photo
By: Patricia Gautry

November 21, 2024 1:36 pm

462 views

CrowdSec and SUSE Linux: Enhancing Security with Collaborative Defense

CrowdSec enables SUSEcustomers with effective, adaptable, community-driven cyber defense.  The CrowdSec Security Engine is a cutting-edge open source and collaborative IDPS that stands out by leveraging the power of crowdsourced intelligence for real-time threat detection and mitigation.  With CrowdSec now available for SUSE Linux, SUSE customers have a powerful, behavioral system for safeguarding […]

Read More


Avatar photo
By: Caroline Thomas

November 20, 2024 5:44 pm

344 views

Compliance-Driven Security at the Edge: Leveraging Cloud Native Edge Computing

Edge computing use cases include chemical production, energy, healthcare, financial systems, national defense, and critical manufacturing. Edge systems in these and similar industries can directly impact critical national infrastructure, which is why it’s so important to ensure compliance-driven security. Cloud native edge computing offers a robust framework for integrating compliance requirements directly into the […]

Read More


Sebastian Martinez
By: Sebastian Martinez

November 19, 2024 7:02 pm

434 views

Top Strategies for Enhancing Linux Server Security

In early 2024, Linux hit above 4% of the global desktop operating system market share. Its popularity is increasing rapidly — and so is the rate of cyberattacks and data breaches in Linux systems.  To protect against cyber threats to your enterprise, it’s vital to secure your Linux servers. Implementing basic security measures […]

Read More


Avatar photo
By: Stacey Miller

November 12, 2024 12:30 pm

2,237 views

Introducing SUSE AI: A Secure, Extensible Deploy and Runtime Platform for GenAI

Artificial intelligence is evolving rapidly. Businesses are constantly seeking open source solutions that offer flexibility, choice, and security. SUSE has always been a leader in this area, and we are now bringing these same qualities to SUSE AI.  We are excited to announce the launch of SUSE AI - a secure, private and enterprise […]

Read More


Avatar photo
By: Kevin Ayres

November 11, 2024 6:51 pm

656 views

Send SUSE Security (NeuVector) events to AWS CloudTrail Lake

Guest writer: Dominik Wombacher, Sr. Partner Solutions Architect, AWS In this Blog, you'll learn how to send SUSE Security (NeuVector) events and reports to AWS CloudTrail Lake . Storing alert data immutably and securely for years is a common use-case. This helps to fulfill audit and compliance requirements and allows access to the ingested data at […]

Read More


Avatar photo
By: Ivan Tarin

October 31, 2024 9:43 pm

575 views

Integrating Zero Trust Container Security in CI/CD Pipelines: Best Practices and Tools

Containers have been a massive step forward for cloud native applications, ensuring companies can reduce the impact on end users while keeping new features, bug fixes and patches continuously up to date on a far more efficient infrastructure. At the same time, the fast-paced nature of CI/CD pipelines into containers, while great for agility, also […]

Read More


Avatar photo
By: Ivan Tarin

October 29, 2024 6:27 pm

547 views

Strengthening Cloud Native Security: A Deep Dive Into Container Runtime Protection

As organizations shift towards cloud native architectures, containers have become the backbone of agile application deployment and resource management. However, the shift has introduced new security challenges, particularly in the runtime phase (when containers execute their operations).  The container runtime phase is arguably the most vulnerable stage of a container’s lifecycle, where the […]

Read More