Microservices Security Primer: How to Secure Microservices APIs

Microservices Security Primer: How to Secure Microservices APIs

If you use Docker containers or other microservices to host your apps, you probably rely heavily on APIs. And if you want to run those apps in production, securing the APIs is ...
A Security Guy’s Top 10 Container Ecosystem Milestones

A Security Guy’s Top 10 Container Ecosystem Milestones

2016 was a big year for the virtual container space, and 2017 looks even more promising. The industry saw tremendous growth and continues to evolve at a rapid pace. Containers, being still ...
SecDevOps and Containers: Kill the Candy-Related Analogies

SecDevOps and Containers: Kill the Candy-Related Analogies

Google “SecDevOps” and the results show that security teams are ready and willing to jump on the DevOps bandwagon. DevOps folks talk a lot about “shifting left,” i.e., addressing issues earlier in ...
Container Security Needs to Be Easy

Container Security Needs to Be Easy

We are all familiar by now with the promised benefits of deploying applications with Docker containers. These include: Significant scalability and agility improvements, Predictable performance and resource isolation, and Application portability and ...
Container Security: Why Bother?

Container Security: Why Bother?

Are containers secure? Probably not. But knowing each approach’s strengths and risks—and available options—could help ease adoption. Such a decision requires two primary considerations: Containers do not provide the same level of ...
Monitor and Protect Docker Containers with Nessus 6.6

Monitor and Protect Docker Containers with Nessus 6.6

Containers are great and provide organizations with the platform and tools necessary to develop and deploy applications more efficiently than traditional software applications or virtual machines. Containers also have the potential to ...
Containers and Security Q&A: Putting a Lid on Risk

Containers and Security Q&A: Putting a Lid on Risk

There is an ongoing discussion today about how containers impact security. Most every development team is implementing (or at least talking about implementing) containers because there are so many benefits to containers ...
5 Docker Best Practices You Should Follow

5 Docker Best Practices You Should Follow

Docker is not the only container technology out there, but it is the de facto standard bearer for containers and it’s the most recognizable brand among the container players. Support for Docker ...
CoreOS Adopts Security-Centric Approach to Containers

CoreOS Adopts Security-Centric Approach to Containers

What’s the big difference between CoreOS and Docker? The belief that the greatest dividends to be reaped from containers is security. That, at least, was the message from CoreOS CEO Alex Polvi ...
| | coreos, rkt, security
Container Security Challenges: Are Container Scanners Enough?

Container Security Challenges: Are Container Scanners Enough?

How secure are containers? Not very, according to open source company Red Hat, which has published a blog post blasting the container ecosystem for lacking good security processes. Here’s a synopsis of ...