Containers

Beyond Size: Don’t Panic at the Distroless
The idea behind distroless is straightforward enough — take away everything unnecessary, leaving only the application and its absolute bare minimum runtime dependencies ...

Solving Container Security Challenges: Vulnerabilities, Shadow Deployments and Deployment Gaps
In containerized environments security risks can exist in three areas: Vulnerabilities in software, shadow containers and deployment problems ...

Getting Started with Containers: A Beginner’s Guide to Docker & DevOps
A beginner-friendly blog and the basic concepts for anyone learning about containers and their importance in the world of DevOps ...

Akamai Unfurls Managed Container Service for Distributed Applications
Akamai Technologies today launched a Managed Container Service that enables organizations to deploy cloud-native applications across a global network made up of more than 4,300 points of presence (PoPs) ...

Navigating Linux Container Challenges With Scott McCarty
Scott McCarty, principal product manager for RHEL Server at Red Hat, discusses the evolving landscape of Linux containers. He talks about how containers have matured from hype to mainstream adoption, yet still ...

Container Adoption Comes with Risks for Software Supply Chain
Multiple critical vulnerabilities and risks have been found lurking within some of the most commonly downloaded Docker Hub container images. The NetRise study examined 70 randomly selected images from the top 250 ...

Edera’s Big Container Security Question: Am I Isolated?
Company releases ‘Am I Isolated’, an open source container security benchmark and Rust-based container runtime scanner ...

Unlocking the Full Potential of Container Vulnerability Scans
Given the complex dependencies of container images, which can rely on other container images with potential vulnerabilities, it is crucial for developers to proactively identify and address container security vulnerabilities before deployment ...

Native Data Protection for VMs on OpenShift: Unlocking Synergies Between Trilio for Kubernetes and Red Hat OpenShift Virtualization
By leveraging the power of Trilio alongside Red Hat OpenShift Virtualization, enterprises can unlock significant synergies to protect virtualized workloads natively and effectively. ...

Tigera Adds Vulnerability Management Capabilities to Calico Platform
Tigera today extended the reach of its container networking and security platform for cloud-native application environments based on open-source Calico software into the realm of vulnerability management. Dhiraj Sehgal, director of product ...