To scan or not to scan?

Should you scan the container images for vulnerabilities? If that question may have crossed your mind or, worse yet, if that question didn’t even pop up in the discussions to secure your containerized applications in production, all you have to do is look at the...

Challenges in securing containers — Part II

In the first part of this blog, I covered the need for container isolation and some of the traditional VM-specific approaches that are applied to protect containers from each other, and also the underlying kernel from the containers. In this second part of the blog, I...

Challenges in securing containers — Part I

What’s the deal with securing containers? This is the first of a two-part blog on container security and the various approaches that can be taken to isolate containers from each other, as well as to protect the kernel that is hosting the containers. In Part One, I...