To scan or not to scan?

Should you scan the container images for vulnerabilities? If that question may have crossed your mind or, worse yet, if that question didn't even pop up in the discussions to secure your containerized applications in production, all you have to do is look at the...
Read More

How Service Discovery Works in Containerized Applications Using Docker Swarm Mode

(Our CTO John Kinsella originally wrote this article for Linux.com) When I first started considering container use in production environments, a question came to mind: When a container may exist across a cluster of servers, how do I get others (people, or...
Read More

Challenges in securing containers — Part II

Why do you need to secure your containerized applications? Is your existing VM-aware security infrastructure enough?

Read More

To scan or not to scan?

Should you scan the container images for vulnerabilities? If that question may have crossed your mind or, worse yet, if that question didn't even pop up in the discussions to secure your containerized applications in production, all you have to do is look at the...

read more

True container isolation

The other day, I was chatting with one of my old buddies who works in the information security sector about containers. The conversation quickly turned into a discussion about container isolation (any wonder, when two security-minded guys are talking? :^)). As we...

read more

Agent versus agentless

What is an agent-based approach for monitoring and control solutions? That question came up in one of my discussions on container security solutions over two weeks ago. Though I gave my perspective and opinion while answering that question, I decided to understand...

read more

Our first open source project!

I have a long history with open source; I first installed Linux in 1993. I can’t remember when I first contributed to an open-source project, although I believe that happened in the late 90s. As I’ve worked with various organizations over the years, I’ve looked for...

read more

ContainerCon: exercises in fact-finding

Layered Insight will be at ContainerCon 2016 in Toronto next week. John Kinsella, co-founder and CTO, will be speaking on a couple of interesting container security topics - http://layeredinsight.com/category/announce/. If you are attending the conference and are...

read more

A Review of Container Types (Part 2)

This post is second part of my blog on the types of container. In the first part, I covered Application Container, Unprivileged Container, OS Container and Privileged Container. In this concluding part, I cover the rest of the container types. Hyper-V Containers and...

read more