Avatar photo
By: Kevin Ayres

December 17, 2024 10:57 pm

26 views

Protect AWS CodePipeline CI/CD workflows with SUSE Security

Guest writer: Dominik Wombacher, Sr. Partner Solutions Architect, AWS   Learn in this Blog how SUSE Security helps to protect AWS CodePipeline CI/CD workflows. This is achieved by conducting security testing within the Pipeline. And ensures that only Artifacts without vulnerabilities are promoted to the next phases. Once in production, SUSE Security continuously scans […]

Read More


Avatar photo
By: Christine Puccio

December 3, 2024 9:41 am

336 views

Avatar photo
By: Caroline Thomas

November 20, 2024 5:44 pm

324 views

Compliance-Driven Security at the Edge: Leveraging Cloud Native Edge Computing

Edge computing use cases include chemical production, energy, healthcare, financial systems, national defense, and critical manufacturing. Edge systems in these and similar industries can directly impact critical national infrastructure, which is why it’s so important to ensure compliance-driven security. Cloud native edge computing offers a robust framework for integrating compliance requirements directly into the […]

Read More


Sebastian Martinez
By: Sebastian Martinez

November 19, 2024 7:02 pm

399 views

Top Strategies for Enhancing Linux Server Security

In early 2024, Linux hit above 4% of the global desktop operating system market share. Its popularity is increasing rapidly — and so is the rate of cyberattacks and data breaches in Linux systems.  To protect against cyber threats to your enterprise, it’s vital to secure your Linux servers. Implementing basic security measures […]

Read More


Avatar photo
By: Ivan Tarin

October 29, 2024 6:27 pm

523 views

Strengthening Cloud Native Security: A Deep Dive Into Container Runtime Protection

As organizations shift towards cloud native architectures, containers have become the backbone of agile application deployment and resource management. However, the shift has introduced new security challenges, particularly in the runtime phase (when containers execute their operations).  The container runtime phase is arguably the most vulnerable stage of a container’s lifecycle, where the […]

Read More


Avatar photo
By: Stacey Miller

October 25, 2024 6:37 pm

1,251 views

Top Security Considerations for Enterprise Implementations of Generative AI

Where data is an organization's most valuable asset, safeguarding its protection, privacy and security becomes the top priority. These tasks become more complex as enterprises begin experimenting with generative AI. As tempting as the opportunities made possible through AI may be, many industries simply cannot afford the risks of potentially exposing data to public, open […]

Read More


Avatar photo
By: Stacey Miller

October 18, 2024 6:34 pm

890 views

Risks and Opportunities for Enterprise Applications of AI Personal Assistants

When it comes to boosting productivity, AI personal assistants do much more than transcribe meetings. Personal assistant capabilities help teams uncover or discover information within mountains of text and files, quickly generate new, purposeful content that resonates with a variety of audiences, and perform increasingly robust service and support functions made possible only through conversational […]

Read More


Avatar photo
By: Patricia Buchholz

October 15, 2024 6:41 am

1,186 views

Join SUSE at SAPinsider Copenhagen, November 12-14, 2024!

As a Platinum sponsor, we're excited to offer valuable insights, expert sessions, and exceptional networking opportunities. Learn how to optimize your SAP infrastructure, explore new possibilities, and prepare for your hybrid future with Edge Integration Cell by SAP. Visit us at booth #1105 for the latest in cloud migration and hybrid infrastructure solutions, and explore […]

Read More


Sebastian Martinez
By: Sebastian Martinez

October 9, 2024 3:47 pm

836 views

Achieve Compliance and Security in Your Linux Estate

Security and compliance in Linux are fundamental requirements for business-critical systems. Enterprises face increasingly sophisticated cyberattacks and a constantly evolving threat landscape. To safeguard sensitive data and ensure regulatory compliance, securing all Linux systems—whether they host mission-critical workloads or not—has become a top priority. As businesses adopt multi-cloud, hybrid and containerized infrastructures, they […]

Read More