BlueCargo optimizes stacks of containers for maximum efficiency

Meet BlueCargo, a logistics startup focused on seaport terminals. The company was part of Y Combinator’s latest batch and recently raised a $3 million funding round from 1984 Ventures, Green Bay Ventures, Sound Ventures, Kima Ventures and others. If you picture a terminal, chances are you see huge piles of containers. But current sorting methods […] Continue reading BlueCargo optimizes stacks of containers for maximum efficiency

Strengthen Production Systems with Container Runtime Security

Container security is not a unitary action but a multifaceted process. It involves securing the build environment using secure code control and other strategies. The procedure also necessitates securing containers’ contents via code analysis and … Continue reading Strengthen Production Systems with Container Runtime Security

Escaping the Whale: Things You Probably Shouldn’t Do With Docker (part 2)

This post is part 2 of a series of blog posts on container hacking. If you haven’t read the part1, you should check it out. Today I’m going to tell you about a new collection of scripts, and a lab VM for hacking containers. Both of these re… Continue reading Escaping the Whale: Things You Probably Shouldn’t Do With Docker (part 2)

Managing trusted certificates revocation in containers in as "cloud native" means as possible

This is a bit of a tough question to ask so bear with me a bit. I’ll try to be brief if I can.

Problem statement

I’m looking for a modern best practice for managing and deploying the trusted root CA certificate list of Docker containers…. Continue reading Managing trusted certificates revocation in containers in as "cloud native" means as possible