As you probably know by now, containers are a high-priority topic at companies of all sizes. But there are a lot of myths surrounding this technology as well, in part because it is new and unfamiliar territory for most, and simply because the technology is so young.
In this post, we’ll debunk five of the pervasive myths and misunderstandings that surround containers, with a focus on Docker (since it is currently the most widely adopted container technology by a sizeable margin). Let’s dive in. Read more “5 Common Myths Around Moving to Docker”
Docker and other container services are appealing for good reason. They are lightweight and flexible. For many organizations, they enable the next step of platform maturity by reducing the needs of a runtime to the bare essentials (at least, that’s the intent).
When you dig into the benefits afforded by containers, it’s easy to see why so many companies have started projects to:
- Containerize their apps and supporting services
- Achieve isolation
- Reduce friction between environments
- Potentially improve deployment cycle times
The software development pattern of small things, loosely coupled, can go even further with an architecture built around containerization. We’re big fans at Threat Stack, and continue to invest in supporting our customers who rely on them. In fact, we recently announced official CoreOS support for our agent.
However, we have discovered that there is no shortage of misunderstandings about Docker (no surprise given the rapid growth and pace of change) and other container services in terms of:
- How their benefits are realized
- The impact on infrastructure/operations
- The implications on overall SDLC and Ops processes
Containers certainly offer plenty of benefits, and it makes good sense to explore whether and how they could work for your organization. But it is also a good idea to take off the rose-colored glasses first and approach this technology realistically. Read more “Why Docker Can’t Solve All Your Problems in the Cloud”
This post is part of a series in which we review key cloud security topics from our most-read blog posts from 2015.
Read more “5 Posts to Revisit Before 2016 – #2 Identifying Insider Threats Within Your Docker Containers”
It’s December, which in Boston means we’re stocking up on L.L. Bean boots and hunkering down for a cold, snowy winter. 2015 has been an incredible year here at Threat Stack — this last quarter, in particular. We’ve been hard at work developing several important integrations to the Threat Stack platform as well as celebrating a few very big milestones. But most of all, we wanted to take a moment to thank you — our incredible community — for all of your support since our launch out of beta last year, and for providing feedback that has inspired several of this quarter’s featured announcements (see below).
To see what we’ve been up to this quarter and what Threat Stack has to offer you (just in case you’ve been considering a solution like ours for 2016), take a look at our year-end update:
Read more “Threat Stack Year-End Update”
Docker. It’s a thing. A big thing. Actually, it’s a bunch of little things. Things called containers that like to pretend they’re running in isolation. Except they’re not. Nevertheless, they’re still hot right now.
Read more “Identifying Insider Threats Within Your Docker Containers”