Adam Spiers
By: Adam Spiers

September 18, 2019 11:37 am


Improving trust in the cloud with OpenStack and AMD SEV

This post contains an exciting announcement, but first I need to provide some context! Ever heard that joke "the cloud is just someone else's computer"? Of course it's a gross over-simplification, but there's more than a grain of truth in it. And that raises the question: if your applications are running in someone else's […]

Read More

Jeff Reser
By: Jeff Reser

September 17, 2019 2:54 pm


Announcing the new IBM LinuxONE III – Combined with SUSE for a Highly Secure Data Serving Platform

Our guest blog writer is Kara Todd, Director of Linux at IBM with an exciting announcement from IBM - with SUSE Linux Enterprise playing an integral role! Announcing the new IBM LinuxONE III - the system you need for the most secure, flexible system to support your initiatives today, and you need that system to […]

Read More

Jeff Reser
By: Jeff Reser

March 6, 2018 2:37 pm


Data Security Reigns Supreme with SUSE on IBM Z Systems

Through the lens of a new wave of technological advances built around advanced analytics, artificial intelligence (AI), machine learning, container development, blockchain, cloud and data security, there’s a shift occurring in how IBM Z systems (and LinuxONE systems) are being used and leveraged. These systems are being refreshed with features around Linux, pervasive […]

Read More

David Byte
By: David Byte

November 3, 2015 7:07 am


Block and Tackle: SUSE Enterprise Storage 2

Here at SUSE, we are proud to continue our rapid pace of innovation in bringing the best to our customers with the release of SUSE Enterprise Storage 2.  This release does far more than just update the code base to the Ceph Hammer release, and I will attempt to outline some of the great […]

Read More

By: mfaris01

January 20, 2011 4:40 pm


Encrypting Container Files in SLES 10 and SLES 11

There are endless documents, articles, editorials and such, on data security and encryption. Views and opinions fly over which methods are better than others and why. AES, DES, Sha1, twoFish256, Blowfish, TripleDogDareYouFish192. File encryption, Partition encryption, Full disk encryption and the popular, No encryption. This article is just concerned with showing you how to encrypt […]

Read More

By: utlemming

September 12, 2008 1:40 pm


IPSEC: Implementing Server-to-Server Encryption of TCP/IP Connections

Introduction Under a variety of circumstances, it is desirable to encrypt data between multiple computers. One of the beauties of open source is that there is a multiplicity of answers. Unfortunately, with those answers comes some confusion. Often times, people overlook some solutions, and one of those solutions is the use of IPSEC transport mode […]

Read More

By: Gracal

August 15, 2008 2:42 pm


Enabling Autokey Crypto in NTP on SLES10

The NTP protocol permits the use of crypto to authenticate clients and servers to each other, as well as between time servers. By default, SLES10 is set up to allow the v3 method of using symmetric keys, but not the v4 method that uses public/private keys. If you want to use the v4 method, this […]

Read More

By: DamianMyerscough

April 11, 2008 6:17 am


File System Encryption

In this article we are going to look at how to encrypt a partition during the installation of SUSE Linux Enterprise and after the installation, we will also look at creating encrypted disk containers. The reason for disk encryption is to protect against malicious users from viewing/stealing your private data. Encrypting Partitions during Installation The […]

Read More

By: utlemming

January 25, 2008 5:08 pm


Implementing boot.crypter for USB token/password authentication of encrypted hard drives and swap space

Download crypter.tar_0.bz2 the idea For most system administrators, desktop users, auditors and managers, data is extremely import. Data like financial, business secrets, and medical records, among a few, are extremely sensitive. The risk of having that data leaked, is greater than the minimal performance hit than doing disk based encryption. With modern computers, […]

Read More