Avatar photo
By: Peter Smails

June 14, 2023 8:42 pm

4,776 views

Navigating the Ever-Evolving Landscape of Cybersecurity Threats

In daily interactions with tech leaders, the term Digital Trust almost always comes up.  Organizations want to ensure that their customers feel safe interacting with them digitally, that their data is secure and that the systems they interact with are reliable. It's apparent that building a Digital Trust relationship is a vital objective for […]

Read More


Avatar photo
By: Raul Mahiques

February 15, 2023 2:32 pm

3,363 views

Ransomware Attacks – Part 2, Traditional IT Security

Table of Contents 1. Introduction 2. How do we protect traditional IT infrastructure? 3. How do I use SELinux, AppArmor and Netfilter? 4. Can STIG hardening guide help me protect my Linux server? 5. How can I apply a STIG profiles to all my servers? 6. Are there any other tools that I can leverage? […]

Read More


Avatar photo
By: Sabine Soellheim

July 4, 2022 4:51 pm

3,414 views

Cybersecurity Threats to SAP Systems

The cybersecurity landscape is constantly changing for SAP customers and prospects. Over the last five years, organizations have gone from being able to rely on any system on a specific network being trusted to a complex and hybrid ecosystem of solutions where completely new approaches to cybersecurity must be followed. Ransomware and malware attacks are […]

Read More


Avatar photo
By: Paolo Perego

February 23, 2022 2:34 pm

3,577 views

Avoid command injection with Apache Common CLI

This article is about using secure coding patterns and correcting vulnerable code. Applications need third-party libraries to provide common facilities for repetitive tasks like logging, parsing, ... When a developer uses an opensource library, he must understand that his code inherits also possible security issues. For this reason, opensource libraries must be audited for risks to […]

Read More


Avatar photo
By: Terri Schlosser

September 17, 2019 1:00 pm

4,451 views

Top 10 Technology Predictions for 2019 Revisited – Here’s my Personal Performance Appraisal

At the beginning of the year, I posted a blog outlining my top 10 tech predictions for 2019 and promised to check back later in the year to see whether my predictions were on the money. We’re now well past the mid-point in the year, so how did I do? For the first 4 […]

Read More


Avatar photo
By: Carolina Pereira

December 18, 2018 8:26 pm

6,933 views

Don`t let Cybersecurity keep you awake. Sleep tight with HPE, SUSE and AMD.

Cybersecurity is definitely a top priority for every business. Especially when we see large enterprises having their brand equity destroyed due to data breeches. But don`t be naïve, small companies might not get that kind of visibility but still, according to research, 60 percent of them who suffer a cyber breech are out of […]

Read More


Avatar photo
By: John Dolen

May 3, 2018 2:57 am

6,280 views

SUSE Partners Provide Endpoint and Data Center Security

RSA Conference, a major information security event, wound down almost two weeks ago.  Hotel prices in San Francisco are back below stratosphere levels (at least for now), but the important work of protecting information continues.  At SUSE, security is a never ending process, and we are committed to delivering best effort security.  […]

Read More


Avatar photo
By: Sabine Soellheim

May 9, 2017 5:41 am

3,262 views

SAPPHIRE NOW: The Realities Of Cybersecurity Vulnerabilities

The following article has been contributed by Lesley Steventon, Virtual Forge, Inc. SAPPHIRE NOW + ASUG Annual Conference is fast approaching. Here are several great reasons to include SUSE partner – and hosting SAP partner Virtual Forge, Inc. as a “must have” on your conference agenda this year!  Schedule an Onsite Strategy Meeting […]

Read More