Containers

Akamai Unfurls Managed Container Service for Distributed Applications
Akamai Technologies today launched a Managed Container Service that enables organizations to deploy cloud-native applications across a global network made up of more than 4,300 points of presence (PoPs) ...

Navigating Linux Container Challenges With Scott McCarty
Scott McCarty, principal product manager for RHEL Server at Red Hat, discusses the evolving landscape of Linux containers. He talks about how containers have matured from hype to mainstream adoption, yet still ...

Container Adoption Comes with Risks for Software Supply Chain
Multiple critical vulnerabilities and risks have been found lurking within some of the most commonly downloaded Docker Hub container images. The NetRise study examined 70 randomly selected images from the top 250 ...

Edera’s Big Container Security Question: Am I Isolated?
Company releases ‘Am I Isolated’, an open source container security benchmark and Rust-based container runtime scanner ...

Unlocking the Full Potential of Container Vulnerability Scans
Given the complex dependencies of container images, which can rely on other container images with potential vulnerabilities, it is crucial for developers to proactively identify and address container security vulnerabilities before deployment ...

Native Data Protection for VMs on OpenShift: Unlocking Synergies Between Trilio for Kubernetes and Red Hat OpenShift Virtualization
By leveraging the power of Trilio alongside Red Hat OpenShift Virtualization, enterprises can unlock significant synergies to protect virtualized workloads natively and effectively. ...

Tigera Adds Vulnerability Management Capabilities to Calico Platform
Tigera today extended the reach of its container networking and security platform for cloud-native application environments based on open-source Calico software into the realm of vulnerability management. Dhiraj Sehgal, director of product ...

Automating Security Compliance in GKE with Policy-as-Code
As organizations increasingly adopt Kubernetes for their container orchestration needs, ensuring security compliance across clusters becomes paramount ...

How Kubernetes and Containers Will Protect — and be Protected by — AI
As companies expand their use of predictive and generative AI in building new applications and services, the security of the underlying data becomes increasingly important — and challenging. Container-focused technologies — including ...

Kubernetes Turns 10: Here’s Seven Ways to Make It Better
What does Kubernetes need to do to maintain its growth? Here are seven ways to make it better ...