Docker Desktop 4.30 offers new proxy authentication enhancements, especially on the Windows front, to ensure seamless integration and interaction.
security
Docker and JFrog Partner to Further Secure Docker Hub and Remove Millions of Imageless Repos with Malicious Links
Docker and JFrog partner to further secure Docker Hub by removing millions of imageless repos with malicious links.
Debian’s Dedication to Security: A Robust Foundation for Docker Developers
We outline how and why Debian operates as a secure basis for development and makes a good choice for Docker Official Images.
From Misconceptions to Mastery: Enhancing Security and Transparency with Docker Official Images
Docker Official Images are an important component of Docker’s commitment to the security of both the software supply chain and open source software. We address three common misconceptions about Docker Official Images and outline seven ways they help secure the software supply chain.
OpenSSH and XZ/liblzma: A Nation-State Attack Was Thwarted, What Did We Learn?
Docker CTO Justin Cormack looks at what we can learn from malicious code in upstream tarballs of xz targeted at a subset of OpenSSH servers. “It is hard to overstate how lucky we were here, as there are no tools that will detect this vulnerability.”
Is Your Container Image Really Distroless?
Find out what makes an image distroless, tools that make the creation of distroless images practical, and security benefits of this approach.
Filter Out Security Vulnerability False Positives with VEX
False positives got you down? VEX works with Docker Scout to filter out false positives in security vulnerabilities. Learn how to get started with this powerful combo.
Azure Container Registry and Docker Hub: Connecting the Dots with Seamless Authentication and Artifact Cache
See best practices for using public images and ensuring the security and reliability of your Docker containers.
How to Use OpenPubkey to Solve Key Management via SSO
We show how OpenPubkey can be used to improve SSH key management, and we look at three use cases in detail.