Avatar photo
By: Helen Tang

August 24, 2023 6:07 pm

830 views

NeuVector now Available on AWS Marketplace!

Cue the fireworks, the long awaited unveiling of NeuVector on AWS Marketplace is finally here! We all know that security is one of the top keywords for everyone's digital transformation projects in 2023. NeuVector delivers true Zero Trust Security and can be seamlessly deployed on AWS! Buy directly from the marketplace, and retire your EDP.[…]

Read More


Avatar photo
By: Sabine Soellheim

August 7, 2023 3:59 pm

1,020 views

Cybersecurity Threats to SAP Systems

Businesses today are in a constant state of digital transformation. SAP software plays a key role in driving this transformation by offering comprehensive solutions that boost efficiency, scalability, and innovation throughout the entire enterprise. As the value of your SAP infrastructure grows, so do security threats. A rise in ransomware attacks, along with new privacy […]

Read More


Avatar photo
By: Meike Chabowski

July 17, 2023 1:43 pm

623 views

New tuning guide: Optimizing Linux for AMD EPYC™ 9004 Series Processors

EPYC is AMD’s flagship mainstream server microprocessors and supports 1-way and 2-way multiprocessing. The first generation was originally announced back in May 2017: At time being, it replaced the previous Opteron server family with the introduction of the Zen microarchitecture for the mainstream market. 4nd Generation AMD EPYC™ Processors With the fourth iteration of […]

Read More


Avatar photo
By: Peter Smails

June 14, 2023 8:42 pm

2,427 views

Navigating the Ever-Evolving Landscape of Cybersecurity Threats

In daily interactions with tech leaders, the term Digital Trust almost always comes up.  Organizations want to ensure that their customers feel safe interacting with them digitally, that their data is secure and that the systems they interact with are reliable. It's apparent that building a Digital Trust relationship is a vital objective for […]

Read More


Avatar photo
By: Ivo Totev

June 5, 2023 8:38 pm

3,000 views

Building Digital Trust: A Holistic Approach to Securing Your Business in the Cloud Native World

In our increasingly digital age, digital trust is the new gold standard. This trust isn't something that’s just given—it's earned, deliberately, through rigorous cybersecurity practices and robust data protection measures. As your business moves more of its operations into the cloud, the ability to build and maintain this digital trust becomes critical to […]

Read More


Avatar photo
By: John Dolen

June 1, 2023 12:45 pm

1,208 views

Unlock the Path to SQL Server Container Modernization with Rancher and DH2i

SUSE guest blog authored by: Don Boxley, Co-Founder and CEO, DH2i SQL Server holds an organization’s most business-critical data assets. Therefore, maximum uptime and security are among the top priorities for the IT teams that manage them. However, industry pressures have these IT pros adding another imperative task to their to-do list: SQL Server […]

Read More


Sebastian Martinez
By: Sebastian Martinez

May 17, 2023 12:35 pm

1,637 views

What Trento 2.0 Means for a Secure SAP Platform? Changes in the SUSE’s tool to reduce risk and improve the reliability of the SAP environments

Besides Trento's existing cluster and cloud best practices validations, Trento 2.0 highlights streamlining the implementation requirements and enables integration. With a new engine that addresses one of the main concerns of security teams, the requirement of an SSH connection to the SAP systems. And the addition of API versioning capabilities to enable the integration […]

Read More


Avatar photo
By: Sabine Soellheim

May 16, 2023 4:23 pm

1,697 views

Innovation in uncertain times. Join SUSE at SAP Sapphire Barcelona Spain, May 24-25, 2023

Organizations today are facing a myriad of challenges. An uncertain macroeconomic climate, rising capital costs, the continued increase in global cybersecurity threats, supply chain issues, and skill shortages all impact their ability to innovate. For over 20 years, SAP and SUSE have delivered innovative business-critical solutions on open-source platforms, enabling organizations to improve operations, increase […]

Read More


Avatar photo
By: ncutler@suse.com

April 20, 2023 12:06 pm

1,428 views

A brief look at SUSE’s CVE tracking process for automotive

What is a CVE? When a security vulnerability in a given software package becomes known, a response must be mounted in order to minimize the probability of malicious actors gaining access to protected computer systems and networks. For serious vulnerabilities, the response involves a number of entities working together, motivated by the common interest of […]

Read More