Avatar photo
By: Meike Chabowski

July 2, 2025 6:22 am

852 views

Your Voice Matters: New SUSE Documentation Survey 2025 is out!

The SUSE Documentation Team is excited to announce the launch of our 2025 Global Documentation Survey! We are calling on you, our valued customers and partners—the hands-on technical experts who use our documentation every day—to share your valuable insights. This year, our survey encompasses the documentation for the entire SUSE portfolio. From SUSE […]

Read More


Avatar photo
By: Ivan Tarin

April 29, 2025 6:40 pm

1,601 views

The Container Security Best Practices You Need To Be Using in 2025

Container security best practices are essential for protecting modern, cloud native applications from evolving threats. As organizations increasingly rely on containers for their speed, scalability and efficiency, securing them becomes more complex — and more critical.  Unlike traditional workloads, containers are highly dynamic, ephemeral and often deployed at massive scale, which means even small […]

Read More


Avatar photo
By: Stacey Miller

March 13, 2025 4:16 pm

1,657 views

Avatar photo
By: Derek Reinhardt

March 12, 2025 3:15 pm

800 views

Integrating SUSE Security with Microsoft Sentinel for Unified Threat Protection

SUSE recently announced a powerful new integration between SUSE Security (formerly NeuVector) and Microsoft Sentinel, a cloud-native security information and event management (SIEM) solution. This integration, further strengthened by the AI capabilities of Microsoft Security Copilot, provides a unified security approach across your hybrid and multi-cloud environments. Why would you want this? Technology is always […]

Read More


Avatar photo
By: Ivan Tarin

January 9, 2025 10:43 pm

1,140 views

Understanding and Maintaining Compliance in Container Environments

Containers help enterprises build, deploy and manage applications in a scalable and efficient way. Their flexibility is part of what has made them so effective but it also introduces compliance and security challenges, particularly in regulated industries.  Navigating these compliance-related challenges often requires the use of specialized container security solutions. In this article, we’[…]

Read More


Avatar photo
By: Giang Pham

December 10, 2024 6:36 pm

1,660 views

How To Advance Container Network Security in Kubernetes

As enterprises work to innovate quickly and adapt to rapidly changing demands, they’ve come to rely heavily on containers. Container technology offers the flexibility, efficiency and scalability needed for the modern IT infrastructure.  However, the shift from traditional perimeter security to network security within Kubernetes clusters has given rise to new challenges. Securing […]

Read More


Avatar photo
By: Kevin Ayres

November 11, 2024 6:51 pm

1,702 views

Send SUSE Security (NeuVector) events to AWS CloudTrail Lake

Guest writer: Dominik Wombacher, Sr. Partner Solutions Architect, AWS In this Blog, you'll learn how to send SUSE Security (NeuVector) events and reports to AWS CloudTrail Lake . Storing alert data immutably and securely for years is a common use-case. This helps to fulfill audit and compliance requirements and allows access to the ingested data at […]

Read More


Avatar photo
By: Glen Kosaka

February 1, 2023 12:54 pm

5,240 views

Container Security: Zero Trust Runtime Security

Protect data in production   Traditional security practices focus on exceptions, blocklists, signatures, malware, and vulnerability scanning. These legacy approaches, while important to a layered security approach, focus efforts on being reactive which is becoming harder to scale. Zero-Trust is critical in moving to a proactive approach to security, where we can declare acceptable behavior […]

Read More


Avatar photo
By: Glen Kosaka

February 1, 2023 12:53 pm

5,033 views

Kubernetes Security: Vulnerability Management 

Profile Risk with Vulnerability Management Throughout the Build, Ship, and Run Pipeline NeuVector scans for vulnerabilities during the entire continuous integration/continuous delivery (CI/CD) pipeline, from Build to Ship to Run. Use the Jenkins plug-in to scan during build, monitor images in registries and run automated tests for security compliance. Prevent deployment of vulnerable images with […]

Read More