Avatar photo
By: Caroline Thomas

January 13, 2025 6:05 pm

138 views

Securing Retail Edge Computing: Addressing Data Risks and Building Trust

Retailers deal with a lot of data from many different places. There’s point-of-sale data, customer personally identifiable information (PII), information on buying habits and profiles and more. To handle the vast amounts of data from so many systems, most retailers use edge computing. While edge computing has significant advantages, like faster data processing time, […]

Read More


Avatar photo
By: Jen Canfor

December 19, 2024 4:24 pm

493 views

Private AI for the Enterprise: Where Data Security Meets Innovation

Security continues to be a top concern for enterprises as artificial intelligence (AI) becomes an integral part of everyday business applications. To protect confidential data, enterprises seek private AI solutions, which allow enterprises to use AI without exposing sensitive information.  Unlike most SaaS-based AI tools, private AI infrastructures and solutions provide enhanced data security […]

Read More


Avatar photo
By: Kevin Ayres

December 17, 2024 10:57 pm

336 views

Protect AWS CodePipeline CI/CD workflows with SUSE Security

Guest writer: Dominik Wombacher, Sr. Partner Solutions Architect, AWS   Learn in this Blog how SUSE Security helps to protect AWS CodePipeline CI/CD workflows. This is achieved by conducting security testing within the Pipeline. And ensures that only Artifacts without vulnerabilities are promoted to the next phases. Once in production, SUSE Security continuously scans […]

Read More


Avatar photo
By: Christine Puccio

December 3, 2024 9:41 am

506 views

Avatar photo
By: Caroline Thomas

November 20, 2024 5:44 pm

402 views

Compliance-Driven Security at the Edge: Leveraging Cloud Native Edge Computing

Edge computing use cases include chemical production, energy, healthcare, financial systems, national defense, and critical manufacturing. Edge systems in these and similar industries can directly impact critical national infrastructure, which is why it’s so important to ensure compliance-driven security. Cloud native edge computing offers a robust framework for integrating compliance requirements directly into the […]

Read More


Sebastian Martinez
By: Sebastian Martinez

November 19, 2024 7:02 pm

546 views

Top Strategies for Enhancing Linux Server Security

In early 2024, Linux hit above 4% of the global desktop operating system market share. Its popularity is increasing rapidly — and so is the rate of cyberattacks and data breaches in Linux systems.  To protect against cyber threats to your enterprise, it’s vital to secure your Linux servers. Implementing basic security measures […]

Read More


Avatar photo
By: Ivan Tarin

October 29, 2024 6:27 pm

628 views

Strengthening Cloud Native Security: A Deep Dive Into Container Runtime Protection

As organizations shift towards cloud native architectures, containers have become the backbone of agile application deployment and resource management. However, the shift has introduced new security challenges, particularly in the runtime phase (when containers execute their operations).  The container runtime phase is arguably the most vulnerable stage of a container’s lifecycle, where the […]

Read More


Avatar photo
By: Stacey Miller

October 25, 2024 6:37 pm

1,497 views

Top Security Considerations for Enterprise Implementations of Generative AI

Where data is an organization's most valuable asset, safeguarding its protection, privacy and security becomes the top priority. These tasks become more complex as enterprises begin experimenting with generative AI. As tempting as the opportunities made possible through AI may be, many industries simply cannot afford the risks of potentially exposing data to public, open […]

Read More


Avatar photo
By: Stacey Miller

October 18, 2024 6:34 pm

1,070 views

Risks and Opportunities for Enterprise Applications of AI Personal Assistants

When it comes to boosting productivity, AI personal assistants do much more than transcribe meetings. Personal assistant capabilities help teams uncover or discover information within mountains of text and files, quickly generate new, purposeful content that resonates with a variety of audiences, and perform increasingly robust service and support functions made possible only through conversational […]

Read More