container security

Cloudsmith Updates Container Registry to Streamline DevSecOps Workflows
Cloudsmith at the Kubecon + CloudNativeCon Europe 2025 conference today added real-time vulnerability scanning along with an ability to automate the signing for container images, as they are cached using the open-source ...

Chainguard Guards Weakest Links In Virtual Machines
Chainguard loves to talk about reducing “developer toil”, the company is clearly keen to present itself as a turnkey solution for reducing threat surface areas and patching burdens on engineering tea ...

Komodor Cleans Up Kubernetes Configuration Calamities
As a specialist in automating Kubernetes operations, health, performance and cost management, Komodor is focused on cleaning up usage patterns surrounding the world’s leading containerization platform ...

Best of 2024: Kubernetes Security Best Practices for 2024
Here's what you should be focusing on in 2024 to keep your Kubernetes environments secure ...

Unlocking the Full Potential of Container Vulnerability Scans
Given the complex dependencies of container images, which can rely on other container images with potential vulnerabilities, it is crucial for developers to proactively identify and address container security vulnerabilities before deployment ...

Proactive Container Security: Prioritizing Vulnerabilities with Reachability
Did you know 70% of container vulnerabilities are never exploited? But the 30% that are can be devastating. In today’s fast-paced DevOps environment, ensuring the security of containerized applications is more critical ...

Ensuring Cybersecurity in Cloud-Native Deployments
The shift to cloud native has many benefits, but has also created a new set of challenges pertaining to cybersecurity ...

Chainguard Allies With Docker, Inc. to Secure Container Images
Chainguard is making its hardened container images available on Docker Hub via the Docker Verified Publisher (DVP) program ...

KSOC Aims to Create Fingerprints for Container Images
KSOC has made available a free catalog for accessing open source container image fingerprints that detects changes to an environment ...

Snyk Discloses ‘Leaky Vessels’ Vuln Requiring Docker Command Line Tool Fix
Snyk identified four vulnerabilities, collectively dubbed “Leaky Vessels,” that AppDev teams should address by updating the runc command line tool ...