Container Security Tools You Need to Know

Cyber security is no longer a luxury. If you need a reminder of that, just take a look at the seemingly endless number of stories appearing in the news lately about things like malware and security breaches. If you manage a Docker environment, and you want to help make sure your organization or users are not mentioned in the news stories that accompany the next big breach, you should know the tools available to you for helping to secure the Docker stack, and put them to work. Read More…

event June 29, 2017
timer Read Time: 5 minutes

Moving Your Monolith: Best Practices and Focus Areas

You have a complex monolithic system that is critical to your business. You’ve read articles and would love to move it to a more modern platform using microservices and containers, but you have no idea where to start. If that sounds like your situation, then this is the article for you. Below, I identify best practices and the areas to focus on as you evolve your monolithic application into a microservices-oriented application. Read More…

event June 26, 2017
timer Read Time: 4 minutes

Refactoring Your App with Microservices

So you’ve decided to use microservices. To help implement them, you may have already started refactoring your app. Or perhaps refactoring is still on your to-do list. In either case, if this is your first major experience with refactoring, at some point, you and your team will come face-to-face with the very large and very obvious question: How do you refactor an app for microservices? That’s the question we’ll be considering in this post. Read More…

Michael Churchman
Michael Churchman
event June 1, 2017
timer Read Time: 7 minutes

Your Guide to Container Security

Your storage system should be locked down with all security and access control tools available to you as well. That is true whether the storage serves containers or any other type of application environment. How do you secure containers? That may sound like a simple question, but it actually has a six- or seven-part answer. That’s because securing containers doesn’t involve just deploying one tool or paying careful attention to one area where vulnerabilities can exist. Read More…

event March 29, 2017
timer Read Time: 6 minutes

training

Get free training from an expert through our classes on Kubernetes and Rancher

Sign Up Now
Contact Us keyboard_arrow_up