Challenges in securing containers — Part II

In the first part of this blog, I covered the need for container isolation and some of the traditional VM-specific approaches that are applied to protect containers from each other, and also the underlying kernel from the containers. In this second part of the blog, I...

Challenges in securing containers — Part I

What’s the deal with securing containers? This is the first of a two-part blog on container security and the various approaches that can be taken to isolate containers from each other, as well as to protect the kernel that is hosting the containers. In Part One, I...