Docker’s keynote story is great… until the software auditors knock on the door
I was reading this Docker blog earlier about the Day 2 Keynote at DockerCon 2017. It highlights the April 2017 announcement that Oracle… (more…)
Read more »Distributing shareware from the 90’s in modern Docker images. Read more
I was reading this Docker blog earlier about the Day 2 Keynote at DockerCon 2017. It highlights the April 2017 announcement that Oracle… (more…)
Read more »Containers are no security devices. That's why we've curated a set of easily actionable recommendations to improve your Docker containers security. Check out the one-page cheat sheet. (more…)
Read more »When you’re building a Docker image for your Python application, you’re building on top of an existing image—and there are many possible choices. There are OS images like Ubuntu, and there are the many different variants of the python base image. Which on... (more…)
Read more »There are two ways to build a Docker image: Running an image, modifying and committing it. This requires access to the live container. Using Dockerfile to build it. ... (more…)
Read more »One of the things that comes up a lot with Docker security is that, by default, the authorization model is all or nothing. Essentially any user or process that has access to the Docker socket (or Docker TCP port if it’s configured to listen on a network) ... (more…)
Read more »The latest Docker news to your inbox. Once a week.
No spam and it’s easy to unsubscribe.