Aqua Security Bolsters Container Security

Aqua Security Bolsters Container Security

Now that containers are showing up with increased frequency in production environments, the challenges associated with securing those containers are becoming more apparent to developers and IT security teams alike. The latest ...
Using Machine Learning to Connect the Dots in Container Security

Using Machine Learning to Connect the Dots in Container Security

There is a weird, virtually universal truth about the relationship between technology and security. There is often an inverse relationship in which the more powerful, useful or convenient a technology is for ...
CNCF Adds 2 Projects to Better Secure Containers

CNCF Adds 2 Projects to Better Secure Containers

At the Open Source Summit Europe 2017 conference today, the Cloud Native Computing Foundation (CNCF) announced it is adding two projects to its portfolio to address the security of container images and ...
Sysdig Melds Container Monitoring and Security

Sysdig Melds Container Monitoring and Security

The concept of employing separate platforms to monitor and secure containers soon may be obsolete if Sysdig has its way. The company has added a Sysdig Secure module to provide visibility into ...
How You Can Defend Containers Against Linux Stack Clash Exploits

How You Can Defend Containers Against Linux Stack Clash Exploits

For those responsible for container security within their organizations, “clashing” is now much more than just a fashion faux pas: The recently discovered Linux Stack Clash vulnerability (CVE-2010-2240) is a serious threat ...
Take a DevOps-first Approach to Security that Leverages Containers

Take a DevOps-first Approach to Security that Leverages Containers

Implementing a DevOps-first approach can drive competitiveness while creating a more secure environment As famous cryptographer Bruce Schneier once said, “Security is a process, not a state or a product.” It is ...
5 Software Delivery Challenges that Containers Won't Solve

5 Software Delivery Challenges that Containers Won’t Solve

Containers are great, but they’re not a panacea. Here are five challenges within the software delivery process that Docker containers can’t help you to solve. To be clear, I don’t mean to ...
Threat Hunting in a Container Environment

Threat Hunting in a Container Environment

It’s a vicious world out there, with new and innovative threats around every corner. As organizations—particularly larger enterprises—move to cloud computing and adopt DevOps practices and container technologies, though, the challenge of ...
Identifying Security Weak Points in a Docker Environment

Identifying Security Weak Points in a Docker Environment

As Docker adoption increases, so does visibility into Docker containers’ security weaknesses. Here’s an overview of the types of security and privacy vulnerabilities that have been discovered in Docker containers so far ...
'Secure by Default': Docker's Container Security Messaging

‘Secure by Default’: Docker’s Container Security Messaging

Containers are not only “secure by default.” They’re more secure than virtual machines. This, at least, is the thesis that Docker is pushing as container technology matures. Is it accurate? For the ...