HackDig : Dig high-quality web security articles for hacker

[SANS ISC] The easy way to analyze huge amounts of PCAP data

I published the following diary on isc.sans.org: “The easy way to analyze huge amounts of PCAP data“. When you are investigating a security incident, there are chances that, at a certain point, you will have to dive into network traffic analysis. If you’re lucky, you’ll have access to a network capture. Approximatively one year ago, I wrote a qui
Publish At:2017-09-28 08:00 | Read:230 | Comments:0 | Tags:Docker SANS Internet Storm Center Security Moloch network pc

Docker Enterprise Edition Now on G-Cloud 9 Framework

  Docker Enterprise Edition (EE) has been accepted to G-Cloud 9, further exemplifying Docker’s commitment to delivering tools for application modernization and innovation across the UK public sector. G-Cloud 9 is the UK government’s latest framework that is designed to simplify and accelerate adoption of cloud-based services within the public sector. The inc
Publish At:2017-06-06 08:45 | Read:598 | Comments:0 | Tags:Docker Orchestration Partners Releases Security docker Docke

Get all the Docker talks from Tech Field Day 12

As 2016 comes to a close, we are excited to have participated in a few of the Tech Field Day and inaugural Cloud Field Day events to share the Docker technology with the IT leaders and evangelists that Stephen Foskett and Tom Hollingsworth have cultivated into this fantastic group.  The final event was Tech Field Day 12 hosting in Silicon Valley. In case you
Publish At:2017-05-24 19:06 | Read:480 | Comments:0 | Tags:Docker Education Engine Events Networking Security docker fo

Tips for Troubleshooting Apps in Production with Docker Datacenter

If you have been using Docker for some time, after the initial phases of building Dockerfiles and running a container here and there, the real work begins in building, deploying and operating multi-container applications in a production environment.  Are you operationally ready to take your application to production? Docker Datacenter provides an integrated
Publish At:2017-05-24 19:06 | Read:504 | Comments:0 | Tags:Docker Engine Orchestration Security docker datacenter docke

Introducing Docker Secrets Management

Containers are changing how we view apps and infrastructure. Whether the code inside containers is big or small, container architecture introduces a change to how that code behaves with hardware – it fundamentally abstracts it from the infrastructure. Docker believes that there are three key components to container security and together they result in
Publish At:2017-05-24 19:05 | Read:579 | Comments:0 | Tags:Docker Engine Engineering Security Container Security Docker

Announcing LinuxKit: A Toolkit for building Secure, Lean and Portable Linux Subsystems

  Last year, one of the most common requests we heard from our users was to bring a Docker-native experience to their platforms. These platforms were many and varied: from cloud platforms such as AWS, Azure, Google Cloud, to server platforms such as Windows Server, desktop platforms that their developers used such as OSX and Windows 10, to mainframes an
Publish At:2017-05-24 19:05 | Read:417 | Comments:0 | Tags:Docker DockerCon Engine Engineering Networking Releases Secu

Docker Enterprise Edition Brings New Life Back to Legacy Apps at Northern Trust

Many organizations understand the value of building modern 12-factor applications with microservices. However, 90+% of applications running today are still traditional, monolithic apps. That is also the case for Northern Trust – a 128-year old financial services company headquartered in Chicago, Illinois. At DockerCon 2017, Rob Tanner, Division Manager
Publish At:2017-05-24 19:05 | Read:466 | Comments:0 | Tags:Docker DockerCon Security Docker EE Docker Enterprise Editio

Common Solutions for DevOps and Discrete Manufacturing

Near the bleeding edge of technology, there’s a lot of talk (and work) around DevOps and the use of containers for delivering services. This is a fast-paced environment where services are spun up and down to meet demand in an elastic cloud and code is shipped to production multiple times a day. It’s also an area where security is far from ‘figured out,’ but
Publish At:2017-03-08 04:11 | Read:677 | Comments:0 | Tags:Featured Articles ICS Security DevOps Docker security

Understanding how Kubernetes DNS Services work

Kubernetes allows you to create container groups and define services on top of them. Kubernetes assigns each service a virtual static IP address routable within the cluster, so any connection that reaches this IP address will be automatically routed to one of the containers in the group. The benefit of using services is that you are able to access the fun
Publish At:2017-01-19 23:00 | Read:1186 | Comments:0 | Tags:Uncategorized Sysdig docker Kubernetes

On Monoliths, Kubernetes, and Monitoring: Transitioning to Docker at Major League Soccer

Earlier this week at Tectonic Summit hosted by CoreOS, we heard Brian Aznar speak about his experience migrating to Docker and Kubernetes, and how his monitoring strategy changed as well. Brian is the director of engineering for Major League Soccer. Brian was interviewed by Loris Degioanni, founder of Sysdig. Below is the text of the conversation, slight
Publish At:2017-01-19 23:00 | Read:1147 | Comments:0 | Tags:Uncategorized Sysdig Cloud docker Kubernetes containers MLS

Troubleshooting Docker and Kubernetes

Container orchestration platforms like Kubernetes, DC/OS Mesos or Docker Swarm help towards making your experience like riding an unicorn over a rainbow, but don’t help much with troubleshooting containers: They are isolated, there is a barrier between you and the process you want to monitor and traditional troubleshooting tools run on the host doesn’t
Publish At:2017-01-19 23:00 | Read:679 | Comments:0 | Tags:Uncategorized Sysdig docker troubleshooting Kubernetes

System Profiling for Lazy Developers

Measuring latency within my code is something that I do very very often. Occasionally I resort to tools like profilers to help me out but, honestly, most of the time I just put timers in my code and print the results to the console or a log file. The reasons are: Running a profiler requires quite a bit of setup, which often is not justified or I’m t
Publish At:2016-09-13 14:35 | Read:889 | Comments:0 | Tags:Uncategorized docker mongodb Sysdig tracers

Container Security: Just The Good Parts

Security is usually a matter of trade-offs. Questions like: “Is X Secure?”, don’t often have direct yes or no answers. A technology can mitigate certain classes of risk even as it exacerbates others. Containers are just such a recent technology and their security impact is complex. Although some of the common risks of containers are beginni
Publish At:2015-04-29 16:45 | Read:989 | Comments:0 | Tags:Security Docker

Before you initiate a “docker pull”

In addition to the general challenges that are inherent to isolating containers, Docker brings with it an entirely new attack surface in the form of its automated fetching and installation mechanism, “docker pull”. It may be counter-intuitive, but “docker pull” both fetches and unpacks a container image in one step. There is no verifi
Publish At:2014-12-20 05:25 | Read:1084 | Comments:0 | Tags:Fedora Red Hat Security Docker

Container Security: Isolation Heaven or Dependency Hell

Docker is the public face of Linux containers and two of Linux’s unsung heroes: control groups (cgroups) and namespaces. Like virtualization, containers are appealing because they help solve two of the oldest problems to plague developers: “dependency hell” and “environmental hell.” Closely related, dependency and environmental
Publish At:2014-12-17 23:25 | Read:1175 | Comments:0 | Tags:Red Hat Security Docker

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud