Avatar photo
By: Kevin Ayres

December 17, 2024 10:57 pm

26 views

Protect AWS CodePipeline CI/CD workflows with SUSE Security

Guest writer: Dominik Wombacher, Sr. Partner Solutions Architect, AWS   Learn in this Blog how SUSE Security helps to protect AWS CodePipeline CI/CD workflows. This is achieved by conducting security testing within the Pipeline. And ensures that only Artifacts without vulnerabilities are promoted to the next phases. Once in production, SUSE Security continuously scans […]

Read More


Avatar photo
By: Ivan Tarin

October 29, 2024 6:27 pm

523 views

Strengthening Cloud Native Security: A Deep Dive Into Container Runtime Protection

As organizations shift towards cloud native architectures, containers have become the backbone of agile application deployment and resource management. However, the shift has introduced new security challenges, particularly in the runtime phase (when containers execute their operations).  The container runtime phase is arguably the most vulnerable stage of a container’s lifecycle, where the […]

Read More


Avatar photo
By: Vince Matev

September 4, 2024 5:29 pm

1,506 views

Edge Computing Reference Architecture with Rancher and Linkerd

  Edge Computing Reference Architecture with Rancher and Linkerd With the exponential growth of connected devices, Edge computing is becoming a game changer. Edge computing is a model that processes data near the network edge where data is generated. It addresses the issues of latency, bandwidth and data privacy more effectively than centralized cloud […]

Read More


Avatar photo
By: Ivan Tarin

June 20, 2024 6:41 pm

2,599 views

NeuVector Prime Wins Fortress Cybersecurity Award, Named Leader in Zero Trust Security

Zero trust security is a crucial strategy in today's rapidly evolving digital landscape. NeuVector Prime was recently honored as a leader in zero trust security, winning the 2024 Fortress Cybersecurity Award in the Zero Trust category. This honor highlights NeuVector Prime’s innovation in zero trust strategies that meet the needs of a changing security […]

Read More


Avatar photo
By: Rachel Cassidy

June 18, 2024 3:50 pm

1,961 views

Empowering Innovation: Celebrating Partner Excellence

Partners are key in differentiated & impactful solutions At the heart of every successful digital transformation journey are our partners. Why? It is through our partner ecosystem that we are able to deliver impactful solutions that leverage SUSE’s open source technologies to accelerate digital transformation for our joint customers.  Our partners are […]

Read More


Avatar photo
By: Abby Costin

May 21, 2024 4:38 pm

3,935 views

How to Protect Against Kubernetes Attacks with the SUSE Container Security Platform

What are common challenges with Kubernetes and container security? The rise of containers and Kubernetes has transformed application development, allowing businesses to deploy modern apps with unprecedented speed and agility. However, this shift to containerized infrastructure presents a new security landscape with challenges. Unlike traditional applications, containers have expanded attack surface – more potential entry […]

Read More


Avatar photo
By: Kevin Ayres

April 16, 2024 2:57 pm

2,769 views

SUSE’s Container Security Platform Now Listed in Amazon EKS Best Practices: A Big Step for Container Security

Thanks to our collaboration with AWS and work from Dominik Wombacher, we're thrilled to announce that SUSE's Container Security Platform, NeuVector Prime, is now recognized in the official Amazon EKS Best Practices documentation across six key security areas: Runtime Security Pod Security Network Security Image Security Incident Response and Forensics Regulatory Compliance   This […]

Read More


Avatar photo
By: Glen Kosaka

April 3, 2024 1:56 pm

4,240 views

How NeuVector Can Protect Against the XZ Backdoor Attack CVE-2024-3094 in Kubernetes Environments

Security researcher Andres Freund reported to Debian that the xz/liblzma library had been backdoored. As a result, CVE-2024-3094 was published with a critical CVSS score of 10. This vulnerability stems from a supply chain compromise on versions 5.6.0 and 5.6.1 of XZ Utils. XZ Utils is data compression software included in […]

Read More


Avatar photo
By: Glen Kosaka

March 15, 2024 7:13 pm

3,160 views

How NeuVector Leverages eBPF to Improve Observability and Security

Extended Berkeley Packet Filter There’s been a lot of recent interest in eBPF (extended Berkeley Packet Filter) and its application for container security solutions. Let’s examine eBPF's features and benefits and how NeuVector utilizes them to enhance its full-lifecycle container security solution. eBPF enables products to run sandboxed programs in a privileged context, […]

Read More