Avatar photo
By: Jeff Reser

June 20, 2022 12:00 pm

2,782 views

Innovation Without Disruption: Introducing SUSE Linux Enterprise 15 SP4 and Security

[This blog post is contributed by Blaine Stone, Certification Compliance Program Manager at SUSE.] At SUSE, we take security seriously. The major areas of our focus are: Secure the Foundations Secure the Product Secure the Supply Chain Confidential Computing SUSE has been working on security for a long time now because we believe in […]

Read More


Avatar photo
By: Fei Huang

May 17, 2022 7:55 am

9,204 views

A Zero Trust, Open Source, Cloud Native Security Model

By now, you’ve probably heard about zero trust security. Zero trust is more than the latest tech marketing buzzword; it’s a practical approach to securing container environments. This model emerged as the application/service perimeter began to disappear as we evolved from physical devices to VMs, microservices and finally, distributed workloads in the cloud […]

Read More


Avatar photo
By: Stacey Miller

April 5, 2022 12:00 pm

3,126 views

Reinforcing Open Source Security with SUSE and the new IBM z16

If the last two years have taught us anything, they’ve taught CIOs how to be resilient.  Resiliency comes in the form of being agile, adaptable, and the right security.  And the ability to thrive in unforeseen circumstances. As CIOs dive deeper into resiliency, they must also answer these questions: Are my systems […]

Read More


Avatar photo
By: Masood

June 2, 2021 6:19 pm

4,112 views

SUSE Guest Blog by Reblaze

Guest Author: Justin Dorfman, Open Source Program Manager, Reblaze   Curiefense is a new, open-source application security platform that protects sites, services and APIs. It extends Envoy proxy to defend against a variety of threats including SQL and command injection, cross-site scripting (XSS), account takeovers (ATOs), application-layer DDoS, remote file inclusion (RFI), API abuse […]

Read More


Avatar photo
By: Marcus Meissner

October 15, 2020 3:16 pm

4,735 views

SUSE Releases Fixes for BleedingTooth Vulnerabilities

Yesterday evening, Google and Intel published a new set of software vulnerabilities that affect machines running Linux Kernels that use Bluetooth. The set of vulnerabilities, called BleedingTooth, impact SUSE Linux Enterprise systems with enabled Bluetooth hardware. There are 3 separate issues bundled into this set: CVE-2020-24490 (BadVibes): A heap overflow when processing extended advertising report […]

Read More


Avatar photo
By: Brice Dekany

August 21, 2020 8:37 am

6,282 views

SUSE Manager and openSCAP: 200 security rules made for you

OpenSCAP is an opensource tool to test and verify security compliance against a set of rules. Did you know that SUSE provides more than 200 rules in its own SCAP Security Guide? See French version Of course there is the SLES Hardening Guide but there is a lot of other security certifications like STIG DISA, […]

Read More


Avatar photo
By: Michael Tabron

April 21, 2020 2:55 pm

4,264 views

SAP System Automation that Fosters Innovation

A simple definition of “automation” is the use of mechanisms or technology to perform a task or procedure with minimal human assistance. I imagine that, like me, most people think of the Industrial Revolution of the 1800s or automotive manufacturing in the 1930s as the beginnings of automation. But even going back as far […]

Read More


Avatar photo
By: Stacey Miller

April 14, 2020 1:07 pm

5,096 views

Security at the Core: SUSE Support for the New IBM z15 and LinuxONE Single Frame Models

If you ask any CIO, they’ll tell you that their architecture must be resilient, secure and agile.  They need to discover ways to generate maximum value from technology investments.   This is why the new IBM z15 and LinuxONE Single Frame Models give CIOs all that and more. These new ultra-modern systems – […]

Read More


Avatar photo
By: Sascha Grunert

March 9, 2020 3:26 pm

15,099 views

Demystifying Containers – Part IV: Container Security

This series of blog posts and corresponding talks aims to provide you with a pragmatic view on containers from a historic perspective. Together we will discover modern cloud architectures layer by layer, which means we will start at the Linux Kernel level and end up at writing our own secure cloud native applications. Simple examples […]

Read More