Avatar photo
By: Karla Romero

February 12, 2025 1:38 am

698 views

Google Cloud Next 2025 Guide: Pro tips from SUSE

Maximize Your Google Cloud Next 2025 Experience: Your Ultimate Guide Google Cloud Next 2025: it's taking over the Mandalay Bay Convention Center in Las Vegas from April 9-11. To help you navigate this exciting tech conference, we've compiled a comprehensive guide packed with pro tips and insights to ensure you maximize your time at the […]

Read More


Avatar photo
By: Caroline Thomas

January 22, 2025 6:19 pm

406 views

Unlocking Retail Innovation With SUSE Edge

Digital technologies continue to reshape the customer experience in the retail industry. Customers now expect everything from seamless online shopping to in-store self-checkout systems. Rising competition means a personalized, frictionless experience isn’t just nice to have…it’s an absolute necessity.  One of the most significant innovations driving the retail customer experience is […]

Read More


Avatar photo
By: Caroline Thomas

January 13, 2025 6:05 pm

422 views

Securing Retail Edge Computing: Addressing Data Risks and Building Trust

Retailers deal with a lot of data from many different places. There’s point-of-sale data, customer personally identifiable information (PII), information on buying habits and profiles and more. To handle the vast amounts of data from so many systems, most retailers use edge computing. While edge computing has significant advantages, like faster data processing time, […]

Read More


Avatar photo
By: Jen Canfor

December 19, 2024 4:24 pm

965 views

Private AI: Securing Innovation for the Future of Enterprise

Private AI is transforming how enterprises leverage artificial intelligence while maintaining strict data security and compliance. As AI becomes embedded in everyday business applications, organizations are increasingly prioritizing solutions that protect confidential data. Private AI enables enterprises to harness the power of AI without exposing sensitive information to third-party providers. Unlike most SaaS-based AI tools, […]

Read More


Avatar photo
By: Kevin Ayres

December 17, 2024 10:57 pm

513 views

Protect AWS CodePipeline CI/CD workflows with SUSE Security

Guest writer: Dominik Wombacher, Sr. Partner Solutions Architect, AWS   Learn in this Blog how SUSE Security helps to protect AWS CodePipeline CI/CD workflows. This is achieved by conducting security testing within the Pipeline. And ensures that only Artifacts without vulnerabilities are promoted to the next phases. Once in production, SUSE Security continuously scans […]

Read More


Avatar photo
By: Christine Puccio

December 3, 2024 9:41 am

1,313 views

Avatar photo
By: Caroline Thomas

November 20, 2024 5:44 pm

565 views

Compliance-Driven Security at the Edge: Leveraging Cloud Native Edge Computing

Edge computing use cases include chemical production, energy, healthcare, financial systems, national defense, and critical manufacturing. Edge systems in these and similar industries can directly impact critical national infrastructure, which is why it’s so important to ensure compliance-driven security. Cloud native edge computing offers a robust framework for integrating compliance requirements directly into the […]

Read More


Sebastian Martinez
By: Sebastian Martinez

November 19, 2024 7:02 pm

1,055 views

Securing Linux Servers: Top Strategies To Ensure Safe Systems

In early 2024, Linux surpassed a 4% share of the global desktop operating system market, reinforcing its growing adoption across enterprises. However, as Linux systems gain traction, cyber threats targeting them are also on the rise. Securing Linux servers is no longer just an option—it’s a necessity to safeguard sensitive data and ensure […]

Read More


Avatar photo
By: Ivan Tarin

October 29, 2024 6:27 pm

899 views

Strengthen Your Container Runtime Security: A Deep Dive Into Cloud Native Protection

Container runtime security is a vital aspect of the shift towards cloud native architectures. The container runtime phase is the backbone of agile application deployment and resource management, however, it is also, arguably, the most vulnerable stage of a container’s lifecycle. When containers execute their operations, Cybercriminals can easily exploit vulnerabilities, misconfigurations or even […]

Read More