Cloud-Native Security
Containers and Security Q&A: Putting a Lid on Risk
There is an ongoing discussion today about how containers impact security. Most every development team is implementing (or at least talking about implementing) containers because there are so many benefits to containers ...
5 Docker Best Practices You Should Follow
Docker is not the only container technology out there, but it is the de facto standard bearer for containers and it’s the most recognizable brand among the container players. Support for Docker ...
CoreOS Adopts Security-Centric Approach to Containers
What’s the big difference between CoreOS and Docker? The belief that the greatest dividends to be reaped from containers is security. That, at least, was the message from CoreOS CEO Alex Polvi ...
Container Security Challenges: Are Container Scanners Enough?
How secure are containers? Not very, according to open source company Red Hat, which has published a blog post blasting the container ecosystem for lacking good security processes. Here’s a synopsis of ...
Container Security And The CDO
The Chief Data Officer (CDO) has leapt into enterprise leadership as a permanent figure, guiding data management to ensure returns on the costs of precious data’s mere existence, including the price of ...
CoreOS raises the bar for container security with Rocket 1.0
CoreOS is a sort of frenemy of Docker—a competitor and partner at the same time—and continues to be a thorn in Docker’s side every once in a while. Now is one of ...
Docker 1.10 Release Updates Storage, Networking and Security
Docker 1.10 is out, bringing with it new orchestration, security and networking features. Taken together, Docker says, the enhancements make the container platform better suited to delivering complex applications at scale by ...
Red Hat and Black Duck team up to deliver a more secure container platform
As a security professional it’s frustrating that security is always an afterthought. Innovative tools and techniques emerge and gain momentum until they become virtually ubiquitous—and then someone eventually stops and says, “Wait ...
Amazon ECR, an EC2 Container Registry Is Now Generally Available With Twistlock Technologies
Amazon EC2 announced today that their Container Registry (ECR) is now generally available. A blog that details the service and its components can be found here. Like other container registries, Amazon ECR is ...
For Container Security, Automation Is Key
Regardless of the IT infrastructure element in question, if it connects to a network – even through proxies or human intermediaries – eventually someone will find a security flaw and exploit it ...

