Avatar photo
By: Raul Mahiques

October 31, 2023 1:09 pm


Confidential Cloud: Introduction to Confidential Computing

Introduction In this blog series, we will embark on a journey into the realm of Confidential Computing, CoCo for friends. Our goal? To help you gain a better understanding of it.   What is confidential computing about? If we seek a definition for 'Confidential Computing,' Wikipedia provides us with the following: “a […]

Read More

Avatar photo
By: Jon Shaw

June 29, 2023 8:49 pm


Digital Trust in Cloud and Containerization: A Shift in the Security Landscape

In today's digital environment, the importance of trust has taken center stage. As more businesses shift from traditional data center infrastructure to cloud and containerized environments, Digital Trust becomes more than just a buzzword; it's an absolute necessity.  The Necessity of Digital Trust  The journey towards Digital Trust starts with a significant paradigm shift […]

Read More

Avatar photo
By: Stacey Miller

June 20, 2023 6:44 am


Avatar photo
By: Peter Smails

June 14, 2023 8:42 pm


Navigating the Ever-Evolving Landscape of Cybersecurity Threats

In daily interactions with tech leaders, the term Digital Trust almost always comes up.  Organizations want to ensure that their customers feel safe interacting with them digitally, that their data is secure and that the systems they interact with are reliable. It's apparent that building a Digital Trust relationship is a vital objective for […]

Read More

Avatar photo
By: Ivo Totev

June 5, 2023 8:38 pm


Building Digital Trust: A Holistic Approach to Securing Your Business in the Cloud Native World

In our increasingly digital age, digital trust is the new gold standard. This trust isn't something that’s just given—it's earned, deliberately, through rigorous cybersecurity practices and robust data protection measures. As your business moves more of its operations into the cloud, the ability to build and maintain this digital trust becomes critical to […]

Read More

Avatar photo
By: John Dolen

June 1, 2023 12:45 pm


Unlock the Path to SQL Server Container Modernization with Rancher and DH2i

SUSE guest blog authored by: Don Boxley, Co-Founder and CEO, DH2i SQL Server holds an organization’s most business-critical data assets. Therefore, maximum uptime and security are among the top priorities for the IT teams that manage them. However, industry pressures have these IT pros adding another imperative task to their to-do list: SQL Server […]

Read More

Avatar photo
By: Sabine Soellheim

January 11, 2023 3:30 pm


SAP Security: 5 Critical Considerations to Protect Your Infrastructure

Your SAP infrastructure hosts applications and processes that are critically important to your business operations. If it goes down, or your data is compromised in a cyberattack, you’ll experience unexpected costs and real operational risks. Cybercriminals know SAP is business-critical, which makes it a prime target for cyberthreats of all kinds. Zero-day attacks that […]

Read More