Avatar photo
By: Ivan Tarin

June 20, 2024 6:41 pm

880 views

NeuVector Prime Wins Fortress Cybersecurity Award, Named Leader in Zero Trust Security

Zero trust security is a crucial strategy in today's rapidly evolving digital landscape. NeuVector Prime was recently honored as a leader in zero trust security, winning the 2024 Fortress Cybersecurity Award in the Zero Trust category. This honor highlights NeuVector Prime’s innovation in zero trust strategies that meet the needs of a changing security […]

Read More


Avatar photo
By: heidi.bronson@suse.com

June 13, 2024 12:03 am

791 views

Revolutionizing Edge Security: A Unified Platform for Securing Kubernetes AI Workloads

SUSE GUEST BLOG AUTHORED BY: Brad Sollar, CTO at Mainsail Industries   The rapid increase in AI use at the edge is leading to advanced cyber threats, requiring innovative security measures. At SUSECON 2024, Mainsail Industries and SUSE introduce a new security framework that provides full-stack protection for AI/ML workloads at the edge. It […]

Read More


Avatar photo
By: Fei Huang

June 12, 2024 8:38 pm

453 views

Understanding and Addressing AI Security Risks

In the digital age, Artificial Intelligence (AI) stands as one of the most transformative technologies, reshaping industries, economies, and even the ways we interact with the world. From enhancing healthcare diagnostics to optimizing supply chain logistics, AI's potential seems boundless. However, amidst the promises of progress, lurk shadows of security risks that demand our attention. […]

Read More


Avatar photo
By: Abby Costin

May 21, 2024 4:38 pm

2,315 views

How to Protect Against Kubernetes Attacks with the SUSE Container Security Platform

What are common challenges with Kubernetes and container security? The rise of containers and Kubernetes has transformed application development, allowing businesses to deploy modern apps with unprecedented speed and agility. However, this shift to containerized infrastructure presents a new security landscape with challenges. Unlike traditional applications, containers have expanded attack surface – more potential entry […]

Read More