Avatar photo
By: Ivan Tarin

June 20, 2024 6:41 pm


NeuVector Prime Wins Fortress Cybersecurity Award, Named Leader in Zero Trust Security

Zero trust security is a crucial strategy in today's rapidly evolving digital landscape. NeuVector Prime was recently honored as a leader in zero trust security, winning the 2024 Fortress Cybersecurity Award in the Zero Trust category. This honor highlights NeuVector Prime’s innovation in zero trust strategies that meet the needs of a changing security […]

Read More

Avatar photo
By: heidi.bronson@suse.com

June 13, 2024 12:03 am


Revolutionizing Edge Security: A Unified Platform for Securing Kubernetes AI Workloads

SUSE GUEST BLOG AUTHORED BY: Brad Sollar, CTO at Mainsail Industries   The rapid increase in AI use at the edge is leading to advanced cyber threats, requiring innovative security measures. At SUSECON 2024, Mainsail Industries and SUSE introduce a new security framework that provides full-stack protection for AI/ML workloads at the edge. It […]

Read More

Avatar photo
By: Glen Kosaka

April 3, 2024 1:56 pm


How NeuVector Can Protect Against the XZ Backdoor Attack CVE-2024-3094 in Kubernetes Environments

Security researcher Andres Freund reported to Debian that the xz/liblzma library had been backdoored. As a result, CVE-2024-3094 was published with a critical CVSS score of 10. This vulnerability stems from a supply chain compromise on versions 5.6.0 and 5.6.1 of XZ Utils. XZ Utils is data compression software included in […]

Read More

Avatar photo
By: Peter Smails

June 14, 2023 8:42 pm


Navigating the Ever-Evolving Landscape of Cybersecurity Threats

In daily interactions with tech leaders, the term Digital Trust almost always comes up.  Organizations want to ensure that their customers feel safe interacting with them digitally, that their data is secure and that the systems they interact with are reliable. It's apparent that building a Digital Trust relationship is a vital objective for […]

Read More

Avatar photo
By: Raul Mahiques

February 15, 2023 2:32 pm


Ransomware Attacks – Part 2, Traditional IT Security

Table of Contents 1. Introduction 2. How do we protect traditional IT infrastructure? 3. How do I use SELinux, AppArmor and Netfilter? 4. Can STIG hardening guide help me protect my Linux server? 5. How can I apply a STIG profiles to all my servers? 6. Are there any other tools that I can leverage? […]

Read More

Avatar photo
By: Sabine Soellheim

July 4, 2022 4:51 pm


Cybersecurity Threats to SAP Systems

The cybersecurity landscape is constantly changing for SAP customers and prospects. Over the last five years, organizations have gone from being able to rely on any system on a specific network being trusted to a complex and hybrid ecosystem of solutions where completely new approaches to cybersecurity must be followed. Ransomware and malware attacks are […]

Read More

Avatar photo
By: Paolo Perego

February 23, 2022 2:34 pm


Avoid command injection with Apache Common CLI

This article is about using secure coding patterns and correcting vulnerable code. Applications need third-party libraries to provide common facilities for repetitive tasks like logging, parsing, ... When a developer uses an opensource library, he must understand that his code inherits also possible security issues. For this reason, opensource libraries must be audited for risks to […]

Read More