J. S. Evans
By: J. S. Evans

October 10, 2017 3:25 pm

What is a CVE and How Can It Benefit Me?

Like a lot of the things that I write here, this is a question that came up in a ticket that I worked on recently. A customer recently received a message like this: Samba is a freely available file- and printer-sharing application maintained and developed by the Samba Development Team. Samba allows users to share […]

Read More

By: msmeissn

September 5, 2017 8:33 pm

Our CVE Pages – self help to security issues in SUSE Linux Enterprise

SUSE CVE Pages SUSE offers various self-service options for getting information on Security Issues. One of these self-service options that are intended for human consumption are our CVE Pages. For every CVE that might be related to our products we provide a webpage with our current status. These pages cover SUSE Enterprise products, and also contain […]

Read More

By: mgerstner

September 5, 2017 8:20 pm

Current Developments in SUSE TPM Packages

In this post I want to give you an overview about recent developments regarding TPM in general and improvements in the area of TPM software packages brought to you in SUSE Linux Enterprise 12 Service Pack 3. I will present our ongoing efforts in this area. What is TPM? TPM stands for Trusted Platform Module. […]

Read More

By: SaSoe

August 21, 2017 6:48 am

Remote Data Center Encryption for Your SAP HANA Log Data

Every single data area processed in SAP HANA is highly sensitive. To safeguard against security threats, SAP HANA includes a built-in feature that encrypts the vast majority of accrued data, known as data volumes, on the SAP HANA server’s hard drive. However, there is no built-in way to encrypt the log files that record ongoing […]

Read More

By: Marijn

August 2, 2017 10:05 am

Security in numbers

During my career I worked most of the time for companies that sold proprietary software and it’s only now, while currently working for SUSE, that I finally see how rich with ample projects the open source world is and how filled it is with software vendors that carry the most surprising names such as Gimp, […]

Read More

By: Andreas Stieger

July 28, 2017 7:58 am

Configuring Smart Card authentication on SUSE Linux Enterprise

This guide describes the configuration of Smart Card authentication on SUSE Linux Enterprise Server 12. Smart Cards are used for user authentication and related cryptography applications. The configuration described here includes the Common Access Card (commonly referred to CAC card) , as used by the United States Department of Defense (DoD) for civil and military […]

Read More

By: SaSoe

May 9, 2017 5:41 am

SAPPHIRE NOW: The Realities Of Cybersecurity Vulnerabilities

The following article has been contributed by Lesley Steventon, Virtual Forge, Inc. SAPPHIRE NOW + ASUG Annual Conference is fast approaching. Here are several great reasons to include SUSE partner – and hosting SAP partner Virtual Forge, Inc. as a “must have” on your conference agenda this year!  Schedule an Onsite Strategy Meeting in Virtual […]

Read More

By: chabowski

April 24, 2017 1:25 pm

There's Life in the Old Dog Yet: Mainframes Are Gaining Ground — Also Thanks to Linux

This article has originally been published in German at DataCenter Insider with the title “Wie wunderbar sind Mainframes – dank Linux“. A huge “Thank You” to chief editor Ulrike Ostler for the permission to publish the article in English at the SUSE blog. Despite all the prophecies of doom, mainframes have never really “gone out of fashion”, and their […]

Read More

By: jlove

April 24, 2017 6:56 am

Encrypting Supportconfig for Added Security

There are cases where the data on your server is extremely sensitive. In these cases sending information, like the supportconfig, to us using standard methods like email and FTP aren’t secure enough. So what can be done? We can use GPG keys to encrypt the data before it is sent. I’ll give the steps of the […]

Read More

By: Drew

March 9, 2017 1:17 pm

Lenovo™ and SUSE® deliver the first integrated enterprise Linux TPM 2.0 solution

The Trusted Platform Module (TPM) is a cryptographic component of many enterprise-class servers.  TPM is an integral part of hardware-based security in these servers, providing tasks such as user authentication, remote access and data protection. System functions such as Intel® Trusted Execution Technology (Intel TXT) use TPM enhancements to help deliver system security. TPM 2.0 […]

Read More