Avatar photo
By: nsuryakumar@suse.com

September 15, 2025 3:24 pm

565 views

Digital Sovereignty and Embedded solutions : Cutting Through the FUD in Europe

Imagine a self-driving car suddenly unable to receive critical security updates due to a geopolitical dispute. Or a factory floor grinding to a halt because a vendor’s software supply chain was compromised. Or a retail store crashing during peak shopping hours because its point-of-sale terminals and smart shelves depend on firmware that can’t […]

Read More


Andreas Prins SUSE
By: Andreas Prins

August 19, 2025 1:30 pm

1,163 views

NIS2 without panic: concrete tips and actions on how to improve it.

The noise is getting louder If you’ve been scanning security and compliance topics on Reddit lately, you’ve probably noticed a shift. On Reddit this week, threads about NIS2 were filled with comments like: “We still don’t know who’s going to audit us.” “If my SaaS provider asks me […]

Read More


Avatar photo
By: jprice@suse.com

July 29, 2025 6:44 am

500 views

Break Free: Stop Vendor Lock‑In From Writing Your IT Roadmap

Welcome back!  In my last post I shared some practical advice and guidance on Digital Transformation - a fancy phrase that is really just the code-name for “IT change”.  Here’s a link if you missed it: [part 1].  One of the topics/tenets I covered briefly was vendor lock-in, how to […]

Read More


Avatar photo
By: Diego Akechi

July 25, 2025 12:59 pm

328 views

Digital Sovereignty for SAP Applications: Why SUSE is Your Trusted Partner

If you have read the blog posts from my colleague Ton Musters, you are probably familiar with SUSE’s position on open sovereign IT and how to get started on your Open Sovereign IT journey.  Digital Sovereignty is an increasingly important consideration for SAP customers, and I want to show you how you can […]

Read More


Andreas Prins SUSE
By: Andreas Prins

July 22, 2025 9:36 am

504 views

Why Digital Sovereignty Starts with Your Application Stack

When organizations discuss digital sovereignty, the focus often stays at the infrastructure or cloud level. But to truly regain control, the stack must extend all the way to the applications. That includes the design tools your teams use every day. Let’s unpack how this works in practice, using Penpot, an open source design tool […]

Read More


Avatar photo
By: Alexandra Settle

July 10, 2025 4:00 am

830 views

SUSE-Certified Data Protection for Virtualization: Enterprise-Ready Assurance for Modern Backup Solutions

  Enterprises demand robust, secure, and interoperable data protection solutions that align with their hybrid infrastructure needs. SUSE’s new Data Protection for Virtualization Certification ensures just that: certified confidence in data protection solutions that work seamlessly with SUSE Virtualization, giving customers the trust they need to protect workloads wherever they run. Why Data […]

Read More


Avatar photo
By: Ton Musters

June 25, 2025 9:10 am

1,308 views

Open Sovereign IT: How to Get Started

I recently detailed SUSE's position on open sovereign IT. It has led to urgent conversations with customers and partners who want to know how to navigate new regulations, mitigate geopolitical risks and build truly resilient IT infrastructure. The challenge is clear: Digital sovereignty isn’t a single product. It is a complex strategy built on […]

Read More


Avatar photo
By: Ton Musters

May 28, 2025 6:55 am

2,814 views

Championing Digital Sovereignty in Europe: SUSE’s Position on Open Sovereign IT

I meet a lot of customers and Digital Sovereignty is on everyone’s minds. For some customers such as governments and those in high-risk or data-sensitive industries, this need for digital sovereignty in Europe has been a long-standing reality.  But for many others, how to successfully navigate and derisk this is new. It’s […]

Read More


Andreas Prins SUSE
By: Andreas Prins

May 7, 2025 8:45 pm

822 views

JPMorgan Chase Sounds the Alarm: Enterprise Software Supply Chains Are Under Attack –Here’s a Smarter Way Forward

Software supply chain security has shifted from a backend problem to a boardroom priority. Security breaches. Compliance mandates. Shadow dependencies. Today’s enterprise software supply chains are under more scrutiny than ever. In a watershed moment, JPMorgan Chase issued a recent open letter to suppliers: the way software vendors approach security needs to change. Not […]

Read More