Avatar photo
By: Fei Huang

July 30, 2020 11:53 am

951 views

How to Protect Container Infrastructures Against the Malware “Doki”

By Fei Huang Recently, security researchers from Intezer shared an interesting case study about malware targeting public Docker environments. Security researchers have named this malware Doki. It is being downloaded and installed as a Linux backdoor. It is using the DynDNS service and a unique Domain Generation Algorithm (DGA) based on the Dogecoin cryptocurrency blockchain […]

Read More


Avatar photo
By: Glen Kosaka

July 26, 2018 12:12 pm

1,311 views

Automating Image Scanning with Jenkins

By Xiaofeng Sun Containers provide an easy and efficient way to deploy applications. But container images may contain open source code over which you don’t have a full control. Many vulnerabilities in open source projects have been reported, and you may decide to use these libraries with vulnerabilities or not after scanning the images […]

Read More


Avatar photo
By: Fei Huang

June 8, 2018 2:59 pm

626 views

The ‘SambaCry’ Samba Vulnerability in Containers

There’s a new vulnerability which could affect containerized apps; this time it’s the Samba vulnerability affecting Linux networking. Samba allows non-Windows operating systems to share network shared folders, files, and printers with a Windows operating system. The network security space keeps catching people’s eyes recently with new exploits affecting popular systems. The […]

Read More


Avatar photo
By: Fei Huang

October 31, 2017 12:40 pm

3,759 views

How to Deploy a Docker Container Firewall

By Gary Duan and Fei Huang Protecting Application Containers A Docker container firewall should be a ‘must-have’ requirement before deploying any container-based applications. In this post we’ll compare a couple ways to deploy a Docker container firewall –  manually vs. with a commercial solution such as NeuVector. However you choose to do […]

Read More


Avatar photo
By: Glen Kosaka

July 19, 2017 2:55 pm

828 views

How to Secure Docker Networking for Access to External Networks and Applications

Getting container visibility and security for docker networking can be a challenge even for a pure container based application stack, or cluster. For most enterprises this challenge can be even tougher when trying to secure a hybrid environment with both container and non-container applications. Many enterprises are in the midst of migration projects to a […]

Read More


Avatar photo
By: Neuvector

January 5, 2017 3:01 pm

2,603 views

How Docker Swarm Container Networking Works – Under the Hood

By Gary Duan, CTO, NeuVector Docker 1.12 is a release loaded with a lot of great features. With built-in orchestration and by removing dependencies on the external KV store, Docker Swarm allows DevOps to quickly deploy a multi-host docker cluster that “just works.” Although not without controversies, when compared to Kubernetes, Docker […]

Read More


Avatar photo
By: Neuvector

December 7, 2016 3:06 pm

802 views

How to Secure AWS Containers and Use ECS for Container Security

AWS containers are growing rapidly in popularity but how to secure containers in production is still a new topic. In this video from AWS re:Invent Henrik Johansson and Michael Capicotto present how to secure containers on AWS and use AWS ECS for security and governance. We also provide a summary below. Session Description Containers have […]

Read More


Avatar photo
By: Fei Huang

September 28, 2016 3:13 pm

764 views

Improving Docker Security: A Better Way to Secure Your Container Network

Using Linux containers like those enabled by Docker provides a perfect encapsulation method to package application components, or micro-services. Is there any need to worry about Docker security? Some would argue that just the process of deploying applications as container based micro-services improves overall security and reduces the applications attack surface. Let’s assume that […]

Read More