Avatar photo
By: Patricia Buchholz

August 21, 2025 2:55 pm

609 views

Why openness is the key to a smarter SAP landscape

Meet SUSE at SAP TechEd Berlin  From November 4–6, 2025, SAP TechEd Berlin will bring developers, architects, and IT innovators together at Messe Berlin. As a Platinum Sponsor, SUSE is excited to showcase how open innovation, hybrid integration, and AI are shaping the future of SAP landscapes. Catch the SUSE + FIS-ASP Live Session […]

Read More


Avatar photo
By: Ryan Hagen

August 18, 2025 1:40 pm

511 views

SUSE Launches 4 New Predefined Consulting Services: Your Fast Track to Secure, Virtualized, and AI-Ready Infrastructure

At SUSE, we know that modern IT organizations are under pressure to move faster, do more with less, and stay secure—across the core, cloud, and edge. That’s why we continue to expand our Predefined Consulting Services (PCS) portfolio with outcome-focused, time-bound offerings that help you get moving—quickly, confidently, and with expert guidance. […]

Read More


Andreas Prins SUSE
By: Andreas Prins

May 7, 2025 8:45 pm

822 views

JPMorgan Chase Sounds the Alarm: Enterprise Software Supply Chains Are Under Attack –Here’s a Smarter Way Forward

Software supply chain security has shifted from a backend problem to a boardroom priority. Security breaches. Compliance mandates. Shadow dependencies. Today’s enterprise software supply chains are under more scrutiny than ever. In a watershed moment, JPMorgan Chase issued a recent open letter to suppliers: the way software vendors approach security needs to change. Not […]

Read More


Sebastian Martinez
By: Sebastian Martinez

March 18, 2025 8:00 am

913 views

Zero Trust Infrastructure with SUSE Linux & Confidential Computing

Traditionally, Zero Trust was related to access control and networking. Today's security and compliance needs and new regulations make it important to adopt an overall Zero Trust Infrastructure. Learn what Zero Trust Infrastructure is and how SUSE Linux's unique approach enables its implementation. Leverage Confidential Computing, attestation and a certification-validated Secure Software Supply Chain for […]

Read More


Avatar photo
By: Emina Cosic

March 5, 2025 7:08 pm

878 views

SUSE® Rancher Prime, Kubewarden, and RKE2 are SLSA Level 3 Compliant – Why Enterprises want SLSA 3

SUSE® Rancher Prime, Kubewarden, and RKE2 are SLSA Level 3 Compliant – Why Enterprises want SLSA 3 At SUSE, security is more than a priority – it’s a fundamental part of everything we do. That’s why we’re proud to announce that SUSE® Rancher Prime 2.10.1, our Admission Policy Manager, and […]

Read More


Avatar photo
By: Ted Jones

October 17, 2024 6:54 pm

1,579 views

Securing the Software Supply Chain for Containers: AWS and SUSE Best Practices

In an era where software development and deployment are increasingly reliant on containerized applications, securing the software supply chain has never been more critical. This blog offers an in-depth exploration of best practices and advanced strategies to safeguard containerized environments. Let's begin by exploring what the software supply chain for containers is, and where the […]

Read More


Avatar photo
By: Marcus Meissner

September 20, 2024 1:54 pm

1,696 views

SUSE has received first FIPS 140-3 cryptographic certificates

After several years of work the NIST CMVP agency has improved upon the existing FIPS 140-2 certification and established the FIPS 140-3 certification. The new standard brings many changes which are described in the Implementation Guidance. They established new requirements on lifecycle of cryptographic primitives and extended in the area of self-tests. They also took […]

Read More


Avatar photo
By: Valentin Lefebvre

August 20, 2024 1:42 pm

6,093 views

Full Disk Encryption with GRUB2 and TPM

  Systems targeted are those using UEFI firmware and Trusted Platform Module (TPM) 2.0 with Secure Boot enabled. Motivation The goals of Full Disk Encryption (FDE) are to secure sensitive data against loss and theft. Today, private user data is increasingly coveted, with the number of cyber security threats only increasing, especially on […]

Read More


Avatar photo
By: Dr. Thomas Di Giacomo

July 24, 2024 6:42 pm

6,743 views

CrowdStrike Outage Exposes the Need for Linux in Critical Systems

Thousands of flights were canceled, leaving travelers stranded during the peak summer travel season. Airports turned into scenes of confusion and frustration as passengers were notified of cancellations and delays. In hospitals, services were canceled and new patients were turned away as medical staff reverted to paper records, trying to manage patient care without access […]

Read More