Doing Big Data Produts Docker Images Right

TL;DR: For containerization, you should not just use the scripts that Big Data tools (or other tools) provide, instead study them and…

Similar

Full Docker Breakout Exploit

Unit 42 researchers share details on a severe Docker container breakout vulnerability and outline a proof-of-concept that demonstrates how it can be exploited if a container has been compromised by a previous attack. (more…)

Read more »

Thoughts on ‘Docker in production’

In previous posts, and even at Cloud Expo, I’ve been pushing the idea that it’s the process that matters, not the technology when it comes to container security. I’ve tried not to make claims that at tied to a specific solution, although I have made...

Read more »