Avatar photo
By: Emina Cosic

November 24, 2025 3:31 pm

2,552 views

Trade the Ingress-NGINX Retirement for up to 2 years of RKE2 support & stability

You’ve likely seen the announcement: Ingress-NGINX will retire after March 2026. Nothing will suddenly stop working on that date, but the security profile changes meaningfully: No new bug fixes and no security patches from upstream. Keeping unmaintained software at the edge of your production environment creates a compliance risk that grows every day. This […]

Read More


FX Houard
By: François-Xavier "FX" Houard

November 11, 2025 6:45 am

570 views

Introducing SUSE Rancher Developer Access (EA) to reduce risk and boost time to market

The software journey is inherently risky, it starts from a developer downloading a container to shipping code on a mission-critical application in production. Developers, naturally, prioritize speed and functionality, which often means grabbing unsafe images with critical vulnerabilities. Meanwhile, platform and operations teams struggle to enforce compliance and security consistently across ever-changing development workflows. That […]

Read More


Avatar photo
By: Ryan Hagen

May 8, 2025 4:20 pm

1,227 views

Future-Ready IT : Replatform, Observe, and Explore with SUSE

In today’s fast-moving digital world, IT leaders are expected to deliver secure, scalable, and intelligent platforms—while also managing cost, complexity, and change. Whether you're running mission-critical apps on Kubernetes, tightening observability, or exploring AI to drive innovation, getting started is often the hardest part. That’s where SUSE’s Predefined Consulting Services (PCS) […]

Read More


Avatar photo
By: Ivan Tarin

April 29, 2025 6:40 pm

2,824 views

The Container Security Best Practices You Need To Be Using in 2025

Container security best practices are essential for protecting modern, cloud native applications from evolving threats. As organizations increasingly rely on containers for their speed, scalability and efficiency, securing them becomes more complex — and more critical.  Unlike traditional workloads, containers are highly dynamic, ephemeral and often deployed at massive scale, which means even small […]

Read More


Avatar photo
By: Ivan Tarin

January 9, 2025 10:43 pm

1,488 views

Understanding and Maintaining Compliance in Container Environments

Containers help enterprises build, deploy and manage applications in a scalable and efficient way. Their flexibility is part of what has made them so effective but it also introduces compliance and security challenges, particularly in regulated industries.  Navigating these compliance-related challenges often requires the use of specialized container security solutions. In this article, we’[…]

Read More


Avatar photo
By: Giang Pham

December 10, 2024 6:36 pm

2,140 views

How To Advance Container Network Security in Kubernetes

As enterprises work to innovate quickly and adapt to rapidly changing demands, they’ve come to rely heavily on containers. Container technology offers the flexibility, efficiency and scalability needed for the modern IT infrastructure.  However, the shift from traditional perimeter security to network security within Kubernetes clusters has given rise to new challenges. Securing […]

Read More


Avatar photo
By: Kevin Ayres

November 11, 2024 6:51 pm

2,381 views

Send SUSE Security (NeuVector) events to AWS CloudTrail Lake

Guest writer: Dominik Wombacher, Sr. Partner Solutions Architect, AWS In this Blog, you'll learn how to send SUSE Security (NeuVector) events and reports to AWS CloudTrail Lake . Storing alert data immutably and securely for years is a common use-case. This helps to fulfill audit and compliance requirements and allows access to the ingested data at […]

Read More


Avatar photo
By: Ivan Tarin

October 29, 2024 6:27 pm

2,211 views

Strengthen Your Container Runtime Security: A Deep Dive Into Cloud Native Protection

Container runtime security is a vital aspect of the shift towards cloud native architectures. The container runtime phase is the backbone of agile application deployment and resource management, however, it is also, arguably, the most vulnerable stage of a container’s lifecycle. When containers execute their operations, Cybercriminals can easily exploit vulnerabilities, misconfigurations or even […]

Read More


Avatar photo
By: Ivan Tarin

October 21, 2024 9:25 pm

2,005 views

Scaling Enterprise Applications With Advanced Container Management Techniques

Containerized applications are challenging just to maintain and keep healthy. Container orchestration, continuous deployment and constant backup can take a toll on your memory and storage capacity and cause network latency. Or simple container misconfigurations can lead to severe loss of memory or storage. Then, as those same apps are scaled to tens of thousands […]

Read More