Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Top 10 cyber security technologies to watch in 2017

Chris Player | June 20, 2017
Cloud, endpoint still relevant as containers, DevOps come into play.


Container security

Containers use a shared operating system (OS) model. An attack on a vulnerability in the host OS could lead to a compromise of all containers.

Containers are not inherently unsecure, but they are being deployed in an unsecure manner by developers, with little or no involvement from security teams and little guidance from security architects. Traditional network and host-based security solutions are blind to containers.

Container security solutions protect the entire life cycle of containers from creation into production and most of the container security solutions provide pre production scanning combined with runtime monitoring and protection.


Previous Page  1  2  3 

Sign up for Computerworld eNewsletters.