Tag Archives: Cyber Resilience

Open Source Technologies Enable Better Resilience & Security 

Security continues to top the list of concerns for organizations as we end 2024 and head into 2025. As cyberattacks grow in sophistication and scale, businesses are rethinking their strategies to protect critical systems and data. Open-source technology, often perceived as a double-edged sword in terms of security, is proving to be a powerful tool in building secure, resilient infrastructures. 


VIshal Ghariwala Profile
Source: SUSE

“If you hide things, you may think you are safe, but once compromised, you might not even know it. Open-source projects leverage the power of a global community, with many eyes constantly reviewing the code. This collaborative scrutiny allows for faster identification and resolution of vulnerabilities…”

Vishal Ghariwala,
Chief Technology Officer, SUSE Asia Pacific


SUSE, a global leader in enterprise-grade open-source solutions, is at the forefront of this revolution. According to Vishal Ghariwala, Chief Technology Officer at SUSE Asia Pacific, “SUSE provides solutions that are secure, interoperable, and empower enterprises to innovate, ultimately delivering value-added services to end consumers.” This ethos has driven SUSE’s success across industries, from finance to automotive, proving that open-source technologies aren’t just about openness—they are about building stronger, safer and more resilient systems. 

Breaking the Myths Around Open Source Security 

One of the most pervasive misconceptions about open-source technology is that its transparency makes it inherently insecure. The logic follows that, since anyone can view the source code, it becomes more vulnerable to exploitation. However, as Ghariwala explains, this openness is precisely what strengthens its security. 

Eyeglasses reflecting computer code on a monitor, ideal for technology and programming themes.
Photo by Kevin Ku

“If you hide things, you may think you are safe, but once compromised, you might not even know it. Open-source projects leverage the power of a global community, with many eyes constantly reviewing the code. This collaborative scrutiny allows for faster identification and resolution of vulnerabilities,” he says. 

Open-source projects are frequently reviewed and analyzed by a broad community of developers, security experts, and organizations, making them inherently resilient against security vulnerabilities. Unlike proprietary systems, which rely on a limited internal team for updates, open-source systems benefit from the collective knowledge and efforts of a global network. This transparency accelerates the identification and resolution of security flaws and minimizes the risk of undetected vulnerabilities. 

The Security Framework of Open-Source Technologies 

SUSE has built its security framework around best practices in open-source governance and proactive risk management. One of the pillars of SUSE’s security is code auditing. Every update or change to SUSE’s open-source software goes through a rigorous code audit process. Developers and security experts in the community conduct continuous reviews to ensure that any potential vulnerabilities are quickly addressed before they can be exploited. 

Additionally, vulnerability management within SUSE open-source platforms involves tracking and analyzing emerging threats. SUSE’s security teams regularly patch and update the software to address newly discovered vulnerabilities, ensuring that users are always operating with the most secure versions. 

Incident response is another vital aspect of SUSE’s approach to open-source security. In the event of a cyberattack or security breach, SUSE’s dedicated security team is responsible for handling all SUSE product-related security incidents. This allows for rapid containment and recovery. This decentralized, transparent approach to security provides organizations with greater visibility and control over their systems compared to traditional proprietary solutions. 

SUSE’s Commitment to Secure Open Source 

SUSE has built its reputation on providing enterprise-grade open-source solutions that ensure organizations can innovate securely. SUSE’s solutions are designed to support highly available, secure, and scalable systems across a range of industries. Some of SUSE’s flagship offerings include: 

  1. SUSE Linux Solutions: Robust Linux operating system solutions tailored for enterprise needs, providing the foundation for secure, mission-critical workloads. 
  1. Cloud-Native Solutions: These include SUSE Rancher Prime, a leading enterprise container management platform, with centralized authentication, access control, observability, and built-in security across the entire stack.   
  1. Edge Computing Solutions: SUSE’s Edge solutions bring computing power to remote or edge locations, enabling secure operations even in challenging environments. 
SUSE Cloud

SUSE’s commitment to open-source transparency and support for its solutions ensures that its users benefit from the same features regardless of whether they choose the open-source or enterprise version of the software. “We don’t create paywalls or separate proprietary versions,” Ghariwala asserts. “The features you get in the open source version are the same as what you get with our enterprise-grade products. The major difference is that our enterprise products are backed by support, patches, and certifications.” 

This unique approach gives organizations the flexibility to adopt cutting-edge open-source technologies without compromising on enterprise-level security and performance. 

Comparative Analysis: Open Source vs. Proprietary Systems 

One of the critical advantages of open-source technology over proprietary systems is the reduced vendor lock-in. Open-source solutions enable organizations to avoid being tethered to a single vendor, which can limit flexibility and innovation. By leveraging open-source tools like SUSE’s Linux Enterprise and Rancher, companies can seamlessly integrate various technologies into their infrastructure, creating a more agile, future-proof system. 

Another advantage is the transparency of open-source systems. In proprietary systems, vulnerabilities may remain undetected for extended periods, leaving organizations exposed to cyber threats. With open-source, vulnerabilities are more quickly identified, allowing for faster patching and reducing the window of exposure. 

In contrast, proprietary solutions often limit access to source code, making it challenging for security experts outside of the company to perform audits or contribute to improvements. Open-source solutions, by their nature, encourage collaboration, which strengthens the overall security and reliability of the system. 

Enhancing Resilience Through Security Innovations 

The rise of cloud-native architectures has transformed how applications are developed and deployed. However, this shift has also expanded the attack surface, requiring new approaches to security. SUSE has embraced this challenge with the SUSE Security (formerly NeuVector) platform. 


VIshal Ghariwala Profile
Source: SUSE

“Modern threats like zero-day attacks and ransomware require solutions that are proactive, not just reactive…”

Vishal Ghariwala,
Chief Technology Officer, SUSE Asia Pacific


SUSE Security provides comprehensive container security, scanning code for vulnerabilities, ensuring compliance with industry standards, and continuously monitoring for potential threats. “Modern threats like zero-day attacks and ransomware require solutions that are proactive, not just reactive,” Ghariwala explains. “NeuVector SUSE Security employs behavioral-based security to anticipate and mitigate potential vulnerabilities.” 

In addition to scanning, SUSE Security’s zero-trust approach monitors application runtime behaviours, automatically identifying deviations that may indicate a threat. This ensures that even unknown vulnerabilities can be mitigated before they are exploited. 

SUSE’s Rancher Prime platform enhances resilience by enabling secure deployment and management of containerized applications. Rancher Prime’s application catalog offers trusted software artifacts, ensuring that developers can build with confidence. Furthermore, its Software Bill of Materials (SBOM) provides a clear dependency chain, enabling rapid identification and resolution of vulnerabilities. 

Case Study: Hyundai Motor Company 

Hyundai Motor Company’s transition to becoming a leader in All-Connected Cars highlights the critical role of open-source technology in enabling innovation. By integrating SUSE Rancher Prime, Hyundai achieved a remarkable 99.95% service level agreement for its Kubernetes-based services. This reliability has empowered Hyundai to deliver over-the-air updates for its software-defined vehicles, enhancing features like safety, navigation, and performance. 

The flexibility and scalability of Rancher Prime allowed Hyundai’s development team to focus on creating cutting-edge technologies for connected vehicles, rather than dealing with the complexity of infrastructure management. “Rancher Prime’s intuitive interface has revolutionized how we manage clusters, drastically reducing setup and management time,” said the Head of Hyundai’s Car Cloud Platform Development Team. 

Case Study: IDC Frontier 

IDC Frontier, a subsidiary of SoftBank Group, used SUSE NeuVector to secure its cloud platform, enabling its customers to confidently deploy containerized applications. NeuVector’s comprehensive security features—including real-time monitoring, vulnerability scanning, and compliance checks—have been crucial in safeguarding IDC Frontier’s services against emerging cyber threats. 

As businesses increasingly rely on cloud-native applications, solutions like NeuVector provide the security and flexibility needed to meet the demands of modern, dynamic environments. IDC Frontier’s use of SUSE’s open-source tools demonstrates the strength of open-source solutions in securing cloud environments at scale. 

Case Study: National Payments Corporation of India (NPCI) 

Handling over 14 million transactions daily, the National Payments Corporation of India (NPCI) needed a secure, high-performance solution to meet the demands of India’s growing digital payments ecosystem. SUSE Linux Enterprise Server provided NPCI with the stability and security required to support its complex infrastructure. By leveraging SUSE’s enterprise-grade solutions, NPCI achieved high availability, reliability, and robust data protection, ensuring smooth transactions even under heavy load. 

NPCI’s success story highlights how SUSE’s open-source solutions can support critical financial services, where uptime and security are paramount. 

Emerging Threats and SUSE’s Forward-Thinking Approach 

The cybersecurity landscape is constantly evolving, with new threats emerging regularly. Among the most concerning are AI-generated malware and ransomware-as-a-service, which are reshaping the threat landscape. “Tools like FraudGPT and WormGPT are now available on the dark web, enabling even non-technical users to create sophisticated malware,” Ghariwala warns. These tools make it easier for cybercriminals to launch targeted attacks at scale, bypassing traditional defense mechanisms. 

SUSE’s proactive security measures, including its zero-trust architecture and behavioral-based monitoring, help organizations defend against these sophisticated threats. By embedding security at every layer of the infrastructure, from development to deployment, SUSE ensures that organizations are prepared for both known and unknown challenges. 

Interoperability: The Cornerstone of Digital Resilience 

Digital resilience is more than just surviving a cyberattack—it’s about ensuring continuity and minimizing disruption. Open-source technology plays a critical role in achieving this by promoting interoperability and reducing vendor lock-in. 

A colorful arrangement of gears symbolizing creativity, innovation, and machinery in vibrant colors.
Photo by Digital Buggu

“Interoperability is essential for building resilient infrastructures,” Ghariwala emphasizes. “SUSE solutions work seamlessly with other technologies, giving organizations the flexibility and choice to adopt diverse IT stacks. This diversity in choice is crucial for avoiding single points of failure.” 

The recent CrowdStrike incident serves as a stark reminder of the risks associated with single-vendor dependency. Ghariwala points out that “a dual-vendor strategy, incorporating open-source solutions, can significantly enhance resilience by providing fallback options.” 

Compliance and the Malaysian Cybersecurity Bill 

The passage of Malaysia’s Cybersecurity Bill highlights the growing regulatory pressure on organizations to maintain secure, resilient systems. SUSE’s solutions help businesses comply with these evolving regulations, ensuring that critical infrastructure remains protected against cyber threats. 

“Our philosophy emphasizes interoperability, technology choice and resilience, helping customers avoid the risks of software concentration,” Ghariwala explains. SUSE’s open-source solutions are designed to be flexible and adaptable, allowing organizations to meet compliance standards while maintaining operational agility. 

The Future of Open Source and Cybersecurity 

Looking ahead, SUSE envisions open-source technology playing an even greater role in cybersecurity and digital resilience. “We’ll continue to focus on security as a horizontal pillar across all our offerings,” Ghariwala says. 

Open source is not just supporting some of the largest institutions in the world, it’s building security and resilience that most can benefit from. Companies like SUSE continue to prove this with by supporting innovative industries like automotive to safeguarding financial systems. They demonstrate how open-source technologies can drive resilience and security without compromising on innovation.  


This article was based on an interview with Vishal Ghariwala, Chief Technology Officer at SUSE Asia Pacific.

VIshal Ghariwala Portrait

Vishal Ghariwala
Chief Technology Officer, SUSE Asia Pacific

Vishal Ghariwala is the Chief Technology Officer for SUSE for the APJ and Greater China regions. In this capacity, he engages with customer and partner executives across the region, and is responsible for growing SUSE’s mindshare by being the executive technical voice to the market, press, and analysts. He also supports the global Office of the CTO to assess relevant industry, market and technology trends and identify opportunities aligned with the company’s strategy.

Prior to joining SUSE, Vishal was the Director for Cloud Native Applications at Red Hat where he led a team of senior technologists responsible for driving the growth and adoption of the Red Hat OpenShift and Middleware portfolios across the Asia Pacific region.

Vishal has over 20 years of experience in the IT industry and holds a Bachelor’s Degree in Electrical and Electronic Engineering from the Nanyang Technological University in Singapore.

Strengthening Core Infrastructure with Proactive Measures and Monitoring

This article was based on an interview with Mr Ramon Pinero, General Manager of BlackBerry AtHoc, and Mr Jonathan Jackson, Senior Director of Strategic Accounts at BlackBerry.

As digital ecosystems grow more complex, the need for robust cybersecurity measures becomes critical. BlackBerry, having transitioned from mobile devices to cybersecurity, is now one of the foremost companies leading the charge in safeguarding critical infrastructure, supply chains, and digital assets through emerging technologies like artificial intelligence (AI) and machine learning (ML). With cyberattacks growing in sophistication, BlackBerry’s focus on prevention and vigilance sets a new standard in cyber resilience.

The Financial Impact of Cyberattacks

The cost of a cyberattack is staggering. A 2024 study from BlackBerry revealed that the average cost of a single data breach has risen to USD 4.45 million. For industries such as healthcare, finance, and energy—where attacks can disrupt critical services—the cost can soar even higher. Beyond immediate financial losses, cyberattacks can damage reputations, erode customer trust, and lead to legal penalties or regulatory fines.

Woman in a Beige Coat Writing on a Glass Panel Using a Whiteboard Marker
Photo by Nataliya Vaitkevich

In particular, ransomware attacks—one of the most prevalent threats—cost companies over USD 1.85 million per incident when factoring in downtime, recovery, and ransom payments​. These costs are unsustainable for many organizations, especially smaller businesses. In the words of Ramon Pinero, General Manager of BlackBerry AtHoc, “If we can prevent attacks from happening, it means that organizations don’t have to spend time and resources recovering from incidents.”

The Rise in Cyber Threats: A Call for Vigilance

BlackBerry’s Global Threat Intelligence Report highlights a surge in cyberattacks. Between April and June 2024, the company prevented 3.7 million attacks— a 53% increase from the previous quarter. Over 800,000 of these attacks targeted critical infrastructure, including the financial sector, energy grids, and healthcare. This increase undoubtedly underlines the importance of continuous vigilance across all sectors.

Prevention Through Proactive AI Solutions

Prevention should be at the core of any company, organization and city’s strategy in dealing with malicious attacks. That being the case, it’s also at the core of BlackBerry’s strategy when it comes to empowering customers. By embedding AI into its cybersecurity solutions, the company is emphasizing deterring cyberattacks before they cause damage. By acquiring Cylance, BlackBerry was able to incorporate predictive AI technology into its security systems, allowing it to proactively prevent cyberattacks instead of just reacting to them.

an illustrated image of a chip with an AI label on it powering a security system
AI-Generated Image by Copilot of an AI Chip embedded in a system

BlackBerry’s AI-powered defence mechanisms are particularly effective in securing critical infrastructure and supply chains. According to the Global Threat Intelligence Report, the company intercepts over 11,500 unique malware hashes daily, highlighting the pace at which new cyber threats emerge.

Supply Chain Security: A Critical Weakness

One of the most significant risks today lies in the vulnerability of software supply chains. BlackBerry’s June 2024 survey on supply chain cybersecurity reveals that more than 75% of software supply chains experienced cyberattacks within the past year. These attacks often target smaller, less secure suppliers as entry points to larger organizations, causing a cascade of damage.

Of concern is that 74% of these attacks originated from third-party vendors or suppliers that organizations were either unaware of or failed to monitor. As BlackBerry’s Vice President of Product Security Christine Gadsby noted, “How a company monitors and manages cybersecurity in their software supply chain has to rely on more than just trust.” In this landscape, prevention demands heightened visibility, continuous monitoring, and regular audits of suppliers’ security postures.

The Role of Managed Detection and Response (MDR)

For organizations without dedicated cybersecurity teams, BlackBerry’s Cylance Managed Detection and Response (MDR) provides critical support. The service offers real-time monitoring and rapid response to emerging threats, ensuring that businesses, especially smaller ones, are not left vulnerable.

According to Jonathan Jackson, Senior Director of Strategic Accounts at BlackBerry, “BlackBerry offers MDR because not every organization can afford a fully staffed cybersecurity team,”. MDR enables companies to utilize sophisticated threat detection tools and professional analysis, allowing them to stay ahead of cybersecurity risks even without an extensive cybersecurity outfit.

Zero Trust for Critical Infrastructure

A zero-trust approach has become essential for protecting critical infrastructure. BlackBerry’s security solutions implement zero-trust architectures, where no device, user, or system is inherently trusted. This model is crucial for sectors like healthcare, finance, and energy, where the stakes are high, and breaches could lead to widespread disruptions.

cyber 4610993 1280
Image from Image by Pete Linforth from Pixabay

“Zero trust is especially important for critical infrastructure because of the types of data and assets involved,” Jackson emphasized. By enforcing strict authentication protocols and continuous monitoring, BlackBerry’s solutions protect critical systems from both internal and external threats.

Resilience for Smart Cities and IoT

As cities become smarter, integrating Internet of Things (IoT) devices into their infrastructure, they become prime targets for cyberattacks. With IoT traffic systems, smart utilities, and public services forming the backbone of modern cities, a single cyberattack could cripple entire urban centres.

Companies like BlackBerry will play a critical role in safeguarding these environments, ensuring that IoT systems are secured and cyber-resilient. “As you have more connected systems, you increase the attack surface,” Jackson explains. AI-driven threat detection and real-time monitoring are vital to ensure that smart cities remain functional despite cheap to cyber threats.

Cyber Resilience Through Prevention

As the cyber threat landscape evolves, prevention and vigilance remain the twin pillars of a robust cybersecurity strategy. Whether protecting supply chains, critical infrastructure, or smart cities, solutions like BlackBerry’s Cylance AI offer a blueprint for building resilience in the face of increasingly sophisticated cyberattacks.

A cyber resilient Kuala Lumpur
AI-Generated Image by Copilot of A cyber resilient Kuala Lumpur

By staying proactive, monitoring vulnerabilities, and implementing zero-trust architectures, organisations can prevent breaches before they occur. As BlackBerry’s research shows, the key to true cyber resilience lies in constant vigilance and a commitment to prevention—because in today’s world, one breach could mean the difference between success and disaster.


This article was written based on an interview session with Mr Ramon Pinero, General Manager of BlackBerry AtHoc and Mr Jonathan Jackson Senior Director of Strategic Accounts at BlackBerry.

Ramon Pinero Profile Pic sq

Ramon Pinero
General Manager BlackBerry AtHoc

Ramon Pinero is the General Manager of BlackBerry AtHoc, where he oversees all aspects of the critical event management business. With more than 20 years of experience in crisis/emergency management (CEM) technologies, Ramon brings a deep understanding of both product development and customer success.

With a passion for technology and deep roots in emergency response, Ramon continues to advance BlackBerry AtHoc’s position as the market leader. He is focused on driving strategy, fostering innovation, and enabling AtHoc’s technology to make an even greater impact—helping more organizations increase their resiliency and save lives through fast, accurate communications before, during, and after critical situations.

Jonathan Jackson Profile Pic

Jonathan Jackson
Senior Director, Strategic Technical Sales APAC at BlackBerry

Jonathan Jackson (JJ) is the Senior Director, Strategic Technical Sales APAC for BlackBerry. With over 20 years of experience, he helps organisations manage their cyber risk, leveraging the best of breed solutions to stop cyber attacks. JJ is a staunch advocate of protecting data and privacy and is a frequent spokesperson on cyber threat intelligence in Australia and all across APAC.