Avatar photo
By: Meike Chabowski

May 7, 2026 9:55 pm

116 views

The SUSE 2025 Security Lowdown

Let’s be real—a "Security Report" doesn't usually scream "fun weekend read." But the SUSE Solution Security Risk Report 2025 (authored by our colleage Stoyan Manolov) is more than just a data dump. It’s a roadmap of how we’re navigating a digital world that’s getting faster, smarter, and—[…]

Read More


Avatar photo
By: Marcus Meissner

April 30, 2026 7:13 am

11,298 views

SUSE responds to the copy.fail vulnerability

Copy Fail (tracked as CVE-2026-31431) is a critical vulnerability in the Linux kernel that allows a local non-root user to gain full root access to the system. It is considered extremely dangerous because it is a pure logic error - unlike other known holes like Dirty Pipe or Dirty COW, it does not require complex […]

Read More


Avatar photo
By: Rick Spencer

March 23, 2026 2:44 pm

573 views

SUSE’s Response to the Trivy Toolchain Incident

UPDATE: Since posting, it’s been reported that more compromised Trivy images have been pushed to Dockerhub. SUSE does not pull images from Dockerhub. Further, on Friday SUSE pinned all of our toolchains to the hash of the last known good version of Trivy so we would not have been susceptible to such an attack. […]

Read More


Avatar photo
By: Karla Romero

February 25, 2026 4:07 am

1,431 views

Google Cloud Next 2026 Guide: The Expert Guide and Pro Tips

Doing Vegas right: navigating the Mandalay Bay  We’re heading back to Las Vegas for Google Cloud Next 2026 at the Mandalay Bay Convention Center from April 22-24. If you’ve been before, you know it’s a lot to handle—from the impossible keynote seats to the sheer size of the expo floor. This […]

Read More


Avatar photo
By: Ivan Tarin

February 24, 2026 11:12 pm

464 views

Unify Visibility and Security Across Your Hybrid Cloud Wherever It Lives

Hybrid environments grow fast, as does the list of tools they require. When teams adopt separate solutions for cluster management, security and observability, each one adds a dashboard, a data model and potential blind spots. The result is sprawl that obscures rather than clarifies. Fortunately, there are practical ways to regain control without sacrificing the […]

Read More


Avatar photo
By: Terry Smith

February 2, 2026 3:17 pm

779 views

Apono and SUSE Rancher Prime: Better Together for Secure Kubernetes Access

SUSE GUEST BLOG ARTICLE AUTHORED BY: Ben Avner is the Head of Ecosystem and Strategic Alliances at Apono, where he leads the company’s global partner strategy and technology alliances. He focuses on building and scaling strategic partnerships that drive product innovation, partner-influenced pipeline, and long-term growth. A former founder and engineer, Ben brings a […]

Read More


Avatar photo
By: Abdelrahman Mohamed

January 23, 2026 11:01 pm

1,563 views

Secure and Scalable Linux Management – A Guide to Deploying SUSE Multi-Linux Manager on Google Cloud

Managing a modern Linux environment is complex. Virtual machines and containers are spread across on-premises data centers and various public clouds. How do you keep them patched, configured, secure, and compliant? This is where a centralized management solution becomes essential.  Key takeaways Centralize Linux lifecycle management across on-premises and cloud environments Deploy SUSE […]

Read More


Avatar photo
By: Marcus Meissner

January 15, 2026 2:08 pm

756 views

Installing FIPS certified packages on SUSE Linux Enterprise Server 15 SP6 and SP7

SUSE has certified and is currently certifying various cryptographic modules for FIPS 140-3 on SUSE Linux Enterprise Server 15 SP6. Nearly all of those modules certified on SLES 15 SP6 can also be used on SLES 15 SP7, and for this purpose they are delivered to the SLES 15 SP7 Certifications Module. The modules consists […]

Read More


FX Houard
By: François-Xavier "FX" Houard

December 24, 2025 10:06 am

566 views

Stability Meets Innovation: The SUSE Application Collection 2025 Retrospective

In 2025, the market for enterprise‑grade distribution of cloud‑native open-source applications didn’t just get busier; it got louder, more unpredictable, and at times outright chaotic. Popular offerings retreated behind sudden paywalls, while other vendors treated the market like a sandbox for their latest monetization pivots, like “sorcerer’s apprentices” endlessly tweaking their models […]

Read More