Avatar photo
By: Meike Chabowski

May 7, 2026 9:55 pm

40 views

The SUSE 2025 Security Lowdown

Let’s be real—a "Security Report" doesn't usually scream "fun weekend read." But the SUSE Solution Security Risk Report 2025 (authored by our colleage Stoyan Manolov) is more than just a data dump. It’s a roadmap of how we’re navigating a digital world that’s getting faster, smarter, and—[…]

Read More


Harald Müller-Ney Senuor Engineering Program Manager
By: Harald Müller-Ney

April 27, 2026 8:20 pm

156 views

SLES 15 SP4 CC EAL4+ – the real value of Common Criteria

Is Your Linux "Certified" or Just "Secure"? 🛡️ In the world of high-stakes IT, Common Criteria (CC) EAL4+ is the ultimate yardstick. But for many, the math doesn't seem to add up: "Why are we touting an OS certification for SLES 15 SP4 when we’re already running SP7?" If you […]

Read More


Andreas Prins SUSE
By: Andreas Prins

January 29, 2026 1:00 pm

1,156 views

Stop Guessing Your Compliance: Master the EU Cloud Sovereignty Framework in Minutes

For the last 2 years, Digital Sovereignty has been the "elephant in the room" for many. You know you need to comply with NIS2, DORA and the upcoming Cyber Resilience Act, but where do you actually start? What are the foreign influences on your stack and where do they influence your autonomy?  The […]

Read More


Avatar photo
By: Dominic Laurie

December 16, 2025 11:25 am

780 views

The Sovereignty Shift: Key Takeaways from The Digital Sovereignty Forum 

The recent Digital Sovereignty Forum in London offered a focused look at the shifting landscape of global technology. The central theme? Digital sovereignty is not a fleeting trend - it is a necessary evolution. Here are my critical takeaways for global enterprises, especially those in the Telco sector. 1. The Core Pillars of Digital Sovereignty […]

Read More


Avatar photo
By: Jean-Philippe Gouin

November 11, 2025 12:01 am

1,503 views

End Security Sprawl: Introducing Unified SSO/RBAC for Centralized Kubernetes Governance

At KubeCon + CloudNativeCon North America 2025, SUSE is tackling one of the most invisible yet costly challenges in cloud native operations, fragmented security. Authentication and access control in modern Kubernetes environments can become complex fast. As clusters multiply and environments expand across hybrid and multi cloud, managing identity silos, permissions, and audit trails often […]

Read More


Avatar photo
By: Davide Iori

November 11, 2025 12:00 am

927 views

Unlock zero-trust policy with SUSE Security Admission Controller now available from the SUSE Application Collection

Is your Kubernetes security policy slowing innovation? At KubeCon North America 2025, SUSE announced the General Availability of the SUSE Security Admission Controller, now delivered exclusively through the SUSE Application Collection for easy trusted consumption complete with VEX, SBOMs, SLSA-3 and more. This enterprise grade distribution of Kubewarden, a project donated by SUSE to the […]

Read More


Avatar photo
By: Meike Chabowski

November 5, 2025 11:06 am

1,722 views

NeuVector for Kubernetes Security and Compliance

This article was written by Hridyesh Singh Bisht, Technical Writer on the SUSE Documentation Team.         Modern Kubernetes environments evolve rapidly, containers start and stop within seconds, workloads scale dynamically, and network connections shift constantly. Traditional firewalls and intrusion prevention systems aren’t designed for this. NeuVector, the […]

Read More


Avatar photo
By: Caroline Thomas

January 13, 2025 6:05 pm

2,145 views

Securing Retail Edge Computing: Addressing Data Risks and Building Trust

Retailers deal with a lot of data from many different places. There’s point-of-sale data, customer personally identifiable information (PII), information on buying habits and profiles and more. To handle the vast amounts of data from so many systems, most retailers use edge computing. While edge computing has significant advantages, like faster data processing time, […]

Read More


Avatar photo
By: Ivan Tarin

January 9, 2025 10:43 pm

1,992 views

Understanding and Maintaining Compliance in Container Environments

Containers help enterprises build, deploy and manage applications in a scalable and efficient way. Their flexibility is part of what has made them so effective but it also introduces compliance and security challenges, particularly in regulated industries.  Navigating these compliance-related challenges often requires the use of specialized container security solutions. In this article, we’[…]

Read More