Marcus Meissner
By: Marcus Meissner

October 15, 2020 3:16 pm

1,982 views

SUSE Releases Fixes for BleedingTooth Vulnerabilities

Yesterday evening, Google and Intel published a new set of software vulnerabilities that affect machines running Linux Kernels that use Bluetooth. The set of vulnerabilities, called BleedingTooth, impact SUSE Linux Enterprise systems with enabled Bluetooth hardware. There are 3 separate issues bundled into this set: CVE-2020-24490 (BadVibes): A heap overflow when processing extended advertising report […]

Read More


Brice Dekany
By: Brice Dekany

August 21, 2020 8:37 am

1,551 views

SUSE Manager and openSCAP: 200 security rules made for you

OpenSCAP is an opensource tool to test and verify security compliance against a set of rules. Did you know that SUSE provides more than 200 rules in its own SCAP Security Guide? See French version Of course there is the SLES Hardening Guide but there is a lot of other security certifications like STIG DISA, […]

Read More


Michael Tabron
By: Michael Tabron

April 21, 2020 2:55 pm

1,535 views

SAP System Automation that Fosters Innovation

A simple definition of “automation” is the use of mechanisms or technology to perform a task or procedure with minimal human assistance. I imagine that, like me, most people think of the Industrial Revolution of the 1800s or automotive manufacturing in the 1930s as the beginnings of automation. But even going back as far […]

Read More


Stacey Miller
By: Stacey Miller

April 14, 2020 1:07 pm

1,882 views

Security at the Core: SUSE Support for the New IBM z15 and LinuxONE Single Frame Models

If you ask any CIO, they’ll tell you that their architecture must be resilient, secure and agile.  They need to discover ways to generate maximum value from technology investments.   This is why the new IBM z15 and LinuxONE Single Frame Models give CIOs all that and more. These new ultra-modern systems – […]

Read More


Sascha Grunert
By: Sascha Grunert

March 9, 2020 3:26 pm

5,236 views

Demystifying Containers – Part IV: Container Security

This series of blog posts and corresponding talks aims to provide you with a pragmatic view on containers from a historic perspective. Together we will discover modern cloud architectures layer by layer, which means we will start at the Linux Kernel level and end up at writing our own secure cloud native applications. Simple examples […]

Read More


Jeff Reser
By: Jeff Reser

September 30, 2019 6:00 pm

2,357 views

SUSE and the New IBM z15 – Securing the World

From my very early days in this industry as an IBM VM/CP programmer, I never would have thought I’d still be talking about this and be a part of the evolution of modern-day innovative value of the mainframe.  Its architecture is resilient, its performance and efficiency are world-class, and its data protection and […]

Read More


Adam Spiers
By: Adam Spiers

September 18, 2019 11:37 am

2,503 views

Improving trust in the cloud with OpenStack and AMD SEV

This post contains an exciting announcement, but first I need to provide some context! Ever heard that joke "the cloud is just someone else's computer"? Of course it's a gross over-simplification, but there's more than a grain of truth in it. And that raises the question: if your applications are running in someone else's […]

Read More


rohamilton
By: rohamilton

August 8, 2019 6:27 pm

2,074 views

A Blunt Reminder About Security for Embedded Computing

  Recent news of the VxWorks security breach raises the unsettling question that those of us in the embedded computing industry have grappled with for decades. How do we secure an embedded operating system from a nefarious attack? The ICS Advisory (ICSA-19-211-01) released on July 30th by the Cybersecurity and Infrastructure Security Agency (CISA) […]

Read More


Marcus Meissner
By: Marcus Meissner

May 13, 2019 3:08 pm

4,985 views

SUSE addresses Microarchitectural Data Sampling Vulnerabilities

Researchers have identified new CPU side channel information leak attacks against various microarchitectural buffers used in Intel CPUs. These attacks allows local attackers to execute code to read out portions of recently read or written data by using speculative execution. Local attackers can be on the same OS or running code on the same thread […]

Read More


John Dolen
By: John Dolen

October 31, 2018 10:55 pm

4,290 views

SUSE Partners Provide Identity, Access, and Privileged User Management

Halloween is being celebrated in many parts of the world today.  While there may be plenty of tricks and treats, and perhaps little goblins showing up at your door, SUSE customers have less to fear, as they leverage security engineered into our products, and provided by our amazing ecosystem partners.  Earlier this year, […]

Read More