Tag: docker images
-
Docker: Secure by Design: A Shift-Left Approach with Testcontainers, Docker Scout, and Hardened Images
Source URL: https://www.docker.com/blog/a-shift-left-approach-with-docker/ Source: Docker Title: Secure by Design: A Shift-Left Approach with Testcontainers, Docker Scout, and Hardened Images Feedly Summary: In today’s fast-paced world of software development, product teams are expected to move quickly: building features, shipping updates, and reacting to user needs in real-time. But moving fast should never mean compromising on quality…
-
Docker: A practitioner’s view on how Docker enables security by default and makes developers work better
Source URL: https://www.docker.com/blog/how-docker-enables-security-by-default/ Source: Docker Title: A practitioner’s view on how Docker enables security by default and makes developers work better Feedly Summary: This blog post was written by Docker Captains, experienced professionals recognized for their expertise with Docker. It shares their firsthand, real-world experiences using Docker in their own work or within the organizations…
-
Docker: Docker MCP Catalog: Finding the Right AI Tools for Your Project
Source URL: https://www.docker.com/blog/finding-the-right-ai-developer-tools-mcp-catalog/ Source: Docker Title: Docker MCP Catalog: Finding the Right AI Tools for Your Project Feedly Summary: As large language models (LLMs) evolve from static text generators to dynamic agents capable of executing actions, there’s a growing need for a standardized way to let them interact with external tooling securely. That’s where Model…
-
Docker: 5 Best Practices for Building, Testing, and Packaging MCP Servers
Source URL: https://www.docker.com/blog/mcp-server-best-practices/ Source: Docker Title: 5 Best Practices for Building, Testing, and Packaging MCP Servers Feedly Summary: We recently launched a new, reimagined Docker MCP Catalog with improved discovery and a new submission process. Containerized MCP servers offer a secure way to run and scale agentic applications and minimize risks tied to host access…
-
Cloud Blog: How Google Cloud is securing open-source credentials at scale
Source URL: https://cloud.google.com/blog/products/identity-security/securing-open-source-credentials-at-scale/ Source: Cloud Blog Title: How Google Cloud is securing open-source credentials at scale Feedly Summary: Credentials are an essential part of modern software development and deployment, granting bearers privileged access to systems, applications, and data. However, credential-related vulnerabilities remain the predominant entry point exploited by threat actors in the cloud. Stolen credentials…