Andreas Prins SUSE
By: Andreas Prins

August 29, 2025 8:37 am

78 views

CRA and the Software Supply Chain: Adapting Without Lock-In

The Cyber Resilience Act has changed the equation for any company that develops and sells software in Europe. Unlike DORA or NIS2, which primarily address internal IT and critical services, the CRA directly applies to digital products placed on the EU market. And the consequences for noncompliance are severe: fines of up to €15 […]

Read More


Andreas Prins SUSE
By: Andreas Prins

August 19, 2025 1:30 pm

328 views

NIS2 without panic: concrete tips and actions on how to improve it.

The noise is getting louder If you’ve been scanning security and compliance topics on Reddit lately, you’ve probably noticed a shift. On Reddit this week, threads about NIS2 were filled with comments like: “We still don’t know who’s going to audit us.” “If my SaaS provider asks me […]

Read More


Andreas Prins SUSE
By: Andreas Prins

July 22, 2025 9:36 am

430 views

Why Digital Sovereignty Starts with Your Application Stack

When organizations discuss digital sovereignty, the focus often stays at the infrastructure or cloud level. But to truly regain control, the stack must extend all the way to the applications. That includes the design tools your teams use every day. Let’s unpack how this works in practice, using Penpot, an open source design tool […]

Read More


Andreas Prins SUSE
By: Andreas Prins

July 18, 2025 8:10 am

369 views

IT Monitoring: An Introductory Guide With 5 Monitoring Strategies

Monitoring is an integral part of most organizations. The monitoring process usually consists of several tools that, combined, show you information about whatever you're monitoring: applications, infrastructure, networks and so forth. While monitoring may seem like an obvious practice to some, it can be challenging to establish the best monitoring strategy for your organization.  […]

Read More


Andreas Prins SUSE
By: Andreas Prins

May 14, 2025 9:57 pm

853 views

Build Trust Into the Platform: How SUSE Rancher Prime, Private Registry, and Security Approach Enterprise Integration

  In cloud native environments software security is no longer a feature. It is a requirement. JPMorgan Chase made that clear in their open letter to software suppliers. The message was simple: security must be part of the design, not something that comes later. In our previous article, we put it like this: “The […]

Read More


Andreas Prins SUSE
By: Andreas Prins

May 7, 2025 8:45 pm

696 views

JPMorgan Chase Sounds the Alarm: Enterprise Software Supply Chains Are Under Attack –Here’s a Smarter Way Forward

Software supply chain security has shifted from a backend problem to a boardroom priority. Security breaches. Compliance mandates. Shadow dependencies. Today’s enterprise software supply chains are under more scrutiny than ever. In a watershed moment, JPMorgan Chase issued a recent open letter to suppliers: the way software vendors approach security needs to change. Not […]

Read More


Andreas Prins SUSE
By: Andreas Prins

April 11, 2025 5:22 pm

809 views

What Is an Anomaly? And How To Detect Them

What is an anomaly? a·nom·a·ly/əˈnäməlē/ noun something that deviates from what is standard, normal‌ or expected. "There are a number of anomalies in the present system." This is the same in IT. An anomaly in your IT environment means that something is not running or performing as expected. Some […]

Read More


Andreas Prins SUSE
By: Andreas Prins

April 3, 2025 11:16 pm

878 views

How to detect and overcome Kubernetes CPU throttling

Not long ago, I set myself a challenge: Could I create a CPU throttling monitor without using SUSE Cloud Observability’s docs page? I'll go a bit deeper into CPU throttling later, but first: Why this mission? I believe that every software developer should be able to observe the health and reliability of their own […]

Read More


Andreas Prins SUSE
By: Andreas Prins

March 13, 2025 8:40 pm

904 views

What is the impact of the Digital Operational Resilience Act (DORA) on my IT?

If you’re in banking, you know the drill. Adhering to stringent EU regulations is ‌standard practice. This involves undergoing extensive audits, closely managing IT assets, maintaining your CIA (Confidentiality, Integrity, Availability) rating, conducting and responding to fire drills‌ and establishing continuity plans. So far, nothing new, and if you’re in other highly […]

Read More