Nov 27th, 2025
March 27, 2023
SUSE Joins the Confidential Computing Consortium
SUSE steps up its focus around data protection and trust with a strong commitment to preserving data integrity from core […]
March 20, 2023
Secure SAP Side-by-Side Extensibility with SUSE, Rancher Prime and NeuVector
Introduction to Secure SAP Side-by-Side extension Keeping up with SAP platform updates and custom ABAP code can be challenging for […]
February 15, 2023
Ransomware Attacks – Part 3, Container Security
Table of Contents 1. Introduction 2. How do we protect Kubernetes environments? 3. Why use Zero-Trust policies to stop the […]
February 15, 2023
Ransomware Attacks – Part 2, Traditional IT Security
Table of Contents 1. Introduction 2. How do we protect traditional IT infrastructure? 3. How do I use SELinux, AppArmor […]
February 15, 2023
Ransomware Attacks – Part 1, Introduction
In this series of articles, I will talk about Ransomware attacks and how we can better protect our systems. What […]
February 13, 2023
Why the public cloud is the ideal platform for your SAP S/4HANA environment
Digital transformation of organizations around the world continues to accelerate as they seek to enhance customer experiences through digital products […]
January 11, 2023
SAP Security: 5 Critical Considerations to Protect Your Infrastructure
Your SAP infrastructure hosts applications and processes that are critically important to your business operations. If it goes down, or […]
January 4, 2023
Another Orchestrated Attack: How Do I Protect Myself?
Criminal groups are always trying to make money by taking advantage of software vulnerabilities. In many organizations, it is difficult […]
January 3, 2023
The Significance of Open Source Software in the Digital-First Future Enterprise
To access the full IDC InfoBrief: The Significance of Open Source Software in the Digital-First Future Enterprise, please click here. […]