To scan or not to scan?

Should you scan the container images for vulnerabilities? If that question may have crossed your mind or, worse yet, if that question didn't even pop up in the discussions to secure your containerized applications in production, all you have to do is look at the...
Read More

How Service Discovery Works in Containerized Applications Using Docker Swarm Mode

(Our CTO John Kinsella originally wrote this article for Linux.com) When I first started considering container use in production environments, a question came to mind: When a container may exist across a cluster of servers, how do I get others (people, or...
Read More

Challenges in securing containers — Part II

Why do you need to secure your containerized applications? Is your existing VM-aware security infrastructure enough?

Read More

My 3 Favorite Things from DockerCon 2016

Earlier this week I was at DockerCon 2016 – two busy days on all things Docker. Originally going to do an overall recap of the show, I’m going to cut to the chase. Here’s my favorites of the DockerCon 2016: The first keynote, Microsoft’s Windows Server Internals talk,...

read more

A Review of Container Types (Part 1)

In the short span since containers burst to the infrastructure scene, various different types of containers have been introduced, and new ones -- or at least new marketing terms for the existing ones -- get introduced every six months. Continuing on the theme of...

read more

The Lifecycle of a Container

As I sat down to write a blog about containers, various topics on the specific advantages or disadvantages associated with the aspects of container ecosystem crossed my mind. But, after going through various iterations, I decided to look back at my journey thus far...

read more