For all the talks of container security innovations need, here at Twistlock, we believe that with the right tools, virtual containers like Docker, can help you improve your security posture. Because containers are declarative and minimal, security tools like Twistlock can build and maintain models of their desired runtime state and then continuously compare their actual execution state against the models. By fortifying this model-driven approach with curated threat data from leading commercial and open source providers, Twistlock can help your containerized apps run more securely than apps deployed using more traditional approaches.
In this video, I walk through a little more background on how this works and why it’s an innovative advance in application security.
- Read The Ultimate Guide to Container Security and learn the ins and outs to securing your containers!
Follow us on Twitter
Keep up to date with the latest news from TwistlockLabs and TwistlockTeam.
Cryptomining Malware Emerges
I have been watching for the spread of malware that, primarily, uses c...
Calling the Twistlock API from PowerShell
The Problem This morning, a colleague was looking for situations where...
What Makes Distributed Security ‘Cloud Native’: Podcast Overview
I caught up with Scott Fulton III on this edition of The New Stack Mak...
Reflections on the 20th Anniversary of Open Source Technology
Exactly twenty years ago in February 1998, the term “open source” ...
Enhanced Syslog Data Streams: 2.3 Deep Dive
In each of our Twistlock releases, we publish some truly remarkable fe...