Navigation Menu

A Concise Introduction to DevSecOps

By on Feb 17, 2019 in Article

Why Should I Care About DevSecOps? Are you a frustrated security professional, trying to get your organization to change (aren’t we all)? Or perhaps, you are trying to get management to value security more? Or maybe, you are a security conscious Developer (wait, do those actually exist? Yes, yes, they do) or Sysadmin who knows you need more security in your...

Read More

A Comparison of Linux Container Images

By on Aug 18, 2017 in Article

  Background Going back to basics, there are two major parts of an operating system – the kernel and the user space. The kernel is a special program executed directly on the hardware or virtual machine – it controls access to resources and schedules process. The other major part is the user space – this is the set of files, including...

Read More

How to Buy a Used Linux Container

By on Jul 22, 2017 in Article

How do you buy a used Linux container? A quick search of “how to buy a shipping container” will turn up a wealth of information, especially how to evaluate used ones. While all analogies are imperfect, this one is pretty good and it does highlight an interesting problem – basically, any Linux container image over a minute old is used in the...

Read More

Securing Docker Containers with sVirt and Trusted Sources

By on May 21, 2015 in Article

Background As has been stated before, Docker containers do not contain all of the parts of the operating system necessary to be considered secure. That said, the advantages of using them is so compelling that many companies, large and small, have began to investigate how to run containers in a production environment. I would argue that it can be done, but careful...

Read More