Avatar photo
By: dlaurie@suse.com

December 16, 2025 11:25 am

317 views

The Sovereignty Shift: Key Takeaways from The Digital Sovereignty Forum 

The recent Digital Sovereignty Forum in London offered a focused look at the shifting landscape of global technology. The central theme? Digital sovereignty is not a fleeting trend - it is a necessary evolution. Here are my critical takeaways for global enterprises, especially those in the Telco sector. 1. The Core Pillars of Digital Sovereignty […]

Read More


Avatar photo
By: Jean-Philippe Gouin

November 11, 2025 12:01 am

751 views

End Security Sprawl: Introducing Unified SSO/RBAC for Centralized Kubernetes Governance

At KubeCon + CloudNativeCon North America 2025, SUSE is tackling one of the most invisible yet costly challenges in cloud native operations, fragmented security. Authentication and access control in modern Kubernetes environments can become complex fast. As clusters multiply and environments expand across hybrid and multi cloud, managing identity silos, permissions, and audit trails often […]

Read More


Avatar photo
By: diori@suse.com

November 11, 2025 12:00 am

460 views

Unlock zero-trust policy with SUSE Security Admission Controller now available from the SUSE Application Collection

Is your Kubernetes security policy slowing innovation? At KubeCon North America 2025, SUSE announced the General Availability of the SUSE Security Admission Controller, now delivered exclusively through the SUSE Application Collection for easy trusted consumption complete with VEX, SBOMs, SLSA-3 and more. This enterprise grade distribution of Kubewarden, a project donated by SUSE to the […]

Read More


Avatar photo
By: Meike Chabowski

November 5, 2025 11:06 am

608 views

NeuVector for Kubernetes Security and Compliance

This article was written by Hridyesh Singh Bisht, Technical Writer on the SUSE Documentation Team.         Modern Kubernetes environments evolve rapidly, containers start and stop within seconds, workloads scale dynamically, and network connections shift constantly. Traditional firewalls and intrusion prevention systems aren’t designed for this. NeuVector, the […]

Read More


Avatar photo
By: Caroline Thomas

January 13, 2025 6:05 pm

1,641 views

Securing Retail Edge Computing: Addressing Data Risks and Building Trust

Retailers deal with a lot of data from many different places. There’s point-of-sale data, customer personally identifiable information (PII), information on buying habits and profiles and more. To handle the vast amounts of data from so many systems, most retailers use edge computing. While edge computing has significant advantages, like faster data processing time, […]

Read More


Avatar photo
By: Ivan Tarin

January 9, 2025 10:43 pm

1,623 views

Understanding and Maintaining Compliance in Container Environments

Containers help enterprises build, deploy and manage applications in a scalable and efficient way. Their flexibility is part of what has made them so effective but it also introduces compliance and security challenges, particularly in regulated industries.  Navigating these compliance-related challenges often requires the use of specialized container security solutions. In this article, we’[…]

Read More


Avatar photo
By: Jen Canfor

January 6, 2025 9:44 pm

1,550 views

5 Reasons Why Enterprise Leaders Must Prioritize Owning Their AI Platforms in 2025

As artificial intelligence (AI) becomes a core technology across industries, enterprises are looking for ways to mitigate associated risks such as data misuse, breaches and non-compliance. For many, the answer is clear: developing and owning a secure deploy and runtime platform designed for AI workloads. This strategy puts data ownership back in the hands of […]

Read More


Avatar photo
By: Caroline Thomas

December 18, 2024 6:01 pm

1,799 views

Compliance for Retailers: Safeguarding Trust and Mitigating Legal Risks

Customer trust is the foundation for sustainable retail success. Beyond safeguarding customer relationships, IT security protects enterprises from legal risks by ensuring compliance with various regulations.   Retailers must navigate a complex array of regulations and standards to ensure that customer data is safeguarded, IT systems are secure, and ethical business practices are upheld. […]

Read More


Avatar photo
By: Christine Puccio

December 3, 2024 9:41 am

2,874 views