Part 2- Verify, Don't Trust: Best Practices for Reducing Vulnerability Exposure in Docker Environments
Containerization is a rapidly growing trend in application hosting infrastructure. There are a number of guiding principles and best practices for building container images. We downloaded and analyzed thousands of the most popular images on Docker Hub - curious to know how community-built images are constructed, and if the most popular ones adhere to these best practices and what surprising security issues surfaced.
View Part 2 of this 2 part webinar mini-series, where we do a deep dive to uncover:
- Best practices for reducing vulnerability exposure in Docker environments
- Processes that enable secure application delivery with Docker
- What to look for when selecting container security automation tools
Ready for a demo? Call 415-964-5222
Thanks for your interest. Watch the webinar by clicking on the button below.