Avatar photo
By: Raul Mahiques

February 15, 2023 6:17 pm

3,726 views

Ransomware Attacks – Part 3, Container Security

Table of Contents 1. Introduction 2. How do we protect Kubernetes environments? 3. Why use Zero-Trust policies to stop the spread of malware? 4. The importance of having a secure software supply chain? 5. Why must we automate security in Kubernetes environments? 6. How can we scale these measures when we have multiple clusters? 7. […]

Read More


Avatar photo
By: Raul Mahiques

February 15, 2023 2:32 pm

3,609 views

Ransomware Attacks – Part 2, Traditional IT Security

Table of Contents 1. Introduction 2. How do we protect traditional IT infrastructure? 3. How do I use SELinux, AppArmor and Netfilter? 4. Can STIG hardening guide help me protect my Linux server? 5. How can I apply a STIG profiles to all my servers? 6. Are there any other tools that I can leverage? […]

Read More


Avatar photo
By: Raul Mahiques

February 15, 2023 10:37 am

4,007 views

Ransomware Attacks – Part 1, Introduction

In this series of articles, I will talk about Ransomware attacks and how we can better protect our systems. What is ransomware? Ransomware is a type of malicious software (malware) that is designed to block access to a computer system or its data, usually by encrypting it, until a ransom is paid. It is typically […]

Read More


Avatar photo
By: Sabine Soellheim

January 11, 2023 3:30 pm

5,275 views

SAP Security: 5 Critical Considerations to Protect Your Infrastructure

Your SAP infrastructure hosts applications and processes that are critically important to your business operations. If it goes down, or your data is compromised in a cyberattack, you’ll experience unexpected costs and real operational risks. Cybercriminals know SAP is business-critical, which makes it a prime target for cyberthreats of all kinds. Zero-day attacks that […]

Read More


Avatar photo
By: German M. Yebenes

December 20, 2022 7:44 am

9,049 views

ALP is moving to its next peak: Punta Baretti

December is here and it is time to deliver the next version of the ALP  project, which we call “Punta Baretti”. For those wondering, ALP stands for ‘Adaptable Linux Platform’. Back in September, we unveiled the ALP. Before jumping into Punta Baretti, let’s recap what ALP is.   What is […]

Read More


Avatar photo
By: Glen Kosaka

December 19, 2022 3:10 pm

9,349 views

Enterprise and Edge Scale Security with NeuVector Container Security 5.1

I’m excited to announce the general availability of the SUSE NeuVector container security platform version 5.1. With the 5.1 release, customers will benefit from more efficient and powerful vulnerability scanning and admission controls across multiple clusters through centralized enterprise scanning, auto-scaling scanners and support for the new Kubernetes (1.25+) pod security […]

Read More


Avatar photo
By: Manoella de Vargas van Meegen

October 7, 2022 9:23 am

3,751 views

SUSE Launches its Inaugural Customer Awards at SUSE Exchange London and Munich

As we celebrate our 30th anniversary this year, we launched the inaugural SUSE Customer Awards to praise the success of our customers. We received 20 nominations for our customers in EMEA across two categories:  Digital Trendsetter – for the most innovative application of SUSE’s solutions  Excellence in Business Transformation – for outstanding business results […]

Read More


Avatar photo
By: Meike Chabowski

October 6, 2022 10:12 pm

2,656 views

Multi-factor authentication on SUSE’s Build Service

This article has been contributed by Jose Gomez, Full Stack Web Developer at SUSE.    Attention: This article does not intend to provide a guide for the Open Build Service (OBS). If you want to learn more about OBS, visit the project’s Web page at http://openbuildservice.org/ and read the specific documentation there […]

Read More


Avatar photo
By: Sabine Soellheim

July 4, 2022 4:51 pm

3,557 views

Cybersecurity Threats to SAP Systems

The cybersecurity landscape is constantly changing for SAP customers and prospects. Over the last five years, organizations have gone from being able to rely on any system on a specific network being trusted to a complex and hybrid ecosystem of solutions where completely new approaches to cybersecurity must be followed. Ransomware and malware attacks are […]

Read More