PART 2- VERIFY, DON’T TRUST: BEST PRACTICES FOR REDUCING VULNERABILITY EXPOSURE IN DOCKER ENVIRONMENTS
Containerization is a rapidly growing trend in application hosting infrastructure. There are a number of guiding principles and best practices for building container images. We downloaded and analyzed thousands of the most popular images on Docker Hub – curious to know how community-built images are constructed, and if the most popular ones adhere to these best practices and what surprising security issues surfaced.
View Part 2 of this 2 part webinar mini-series, where we do a deep dive to uncover:
- Best practices for reducing vulnerability exposure in Docker environments
- Processes that enable secure application delivery with Docker
- What to look for when selecting container security automation tools