Containers

Compromised containers could not only corrupt the processes and tasks that the container is undertaking, it could also open the door for a cascade of additional attacks against the underlying network.

  • As much security by design as possible (before deployment)

  • Monitor applications in runtime

  • Scan everywhere

Articles