container security
Java Code Isn’t the Problem – The Container IsÂ
Learn how integrating Docker Scout into Java CI pipelines shifts container security left, replacing manual reviews with automated gates to secure base images and dependencies ...
OWASP Has Adopted DockSec and the Cloud Security Community Is Taking Notice
With more than 13,000 downloads across more than 40 countries, DockSec has earned its place as an OWASP Incubator Project by doing something most container security tools have not managed: closing the ...
Kubernetes v1.36 Promotes Stability, Compatibility & Reproducibility
Kubernetes v1.36 (Spring 2026) introduces 70 enhancements, including major security hardening for the Kubelet API and the debut of Workload-Aware Scheduling (WAS) for AI/ML. This release focuses on fine-grained resource health, stable ...
Adrian Bridgwater | | AI/ML Infrastructure, CI/CD, cloud native security, cloud-native applications, Cluster Hardening, container security, containers, CSI Token Redaction, developers, Distributed Training, DRA, Dynamic Resource Allocation, External Token Signing, Gang Scheduling, K8s v1.36, Kubelet API Authorization, kubernetes, Kubernetes Enhancements 2026., Kubernetes v1.36, microservices, Node Logs, open source, PodGroup API, Resource Health Status, storage, Volume Group Snapshots, WAS, workload-aware scheduling
Dockerfile Practices are a DevOps Tax Before They are a Security ConcernÂ
Learn how poor Dockerfile discipline creates silent technical debt and how tools like DockSec use AI and static analysis to optimize build times, reduce image sizes, and standardize DevOps workflows ...
CleanStart Takes Aim at BusyBox to Harden Container Security
Container security faces a significant "inheritance risk" through BusyBox, a legacy utility package embedded in popular base images. CleanStart addresses this with a new BusyBox-free container architecture, replacing inherited userspace utilities with ...
The New Multi-Tenant Challenge: Securing AI Agents in Cloud-Native Infrastructure
AI agents run untrusted code. Here’s how to secure them using isolation, least privilege and proven cloud-native patterns ...
The Cyber Resilience Act and Cloud Native: Understanding the Impact
How the EU Cyber Resilience Act will impact Kubernetes, containers and cloud native supply chains ahead of the 2027 enforcement deadline ...
Software Supply Chain Security: Why 99% of Your Container is Mystery Code
In a recent talk, the disparity between developers and platform engineers in container security was highlighted, revealing how a single line of code can pull in thousands of vulnerabilities. This article discusses ...
Jeroen van Erp | | Attestation, container security, Continuous Integration/Continuous Deployment (CI/CD), Dependency Management, Developer Relations, GitOps, Kubewarden, platform engineering, Provenance, Secure Base Images, SLSA compliance, Software Bill of Materials (SBOM), software supply chain security, Trust in Software Development., vulnerabilities
Survey Surfaces Raft of Container Security Challenges
A BellSoft survey reveals gaps in container security practices, showing that human error, limited vulnerability scanning, and infrequent patching continue to expose cloud-native environments to risk ...
Docker, Inc. Adds More Than a Thousand Free Hardened Container Images
Docker is releasing more than 1,000 hardened container images under an open source license, aiming to cut vulnerabilities and strengthen software supply chains ...

