Skip to main content

Container Security Blog

Deep dives into container security, supply chain integrity, CVE remediation, and the engineering behind ImageSentinel.

Featured Post

Featured8 min read

Why We Built ImageSentinel on a Hardened Minimal Base

Traditional container base images come with significant security baggage. Debian, Ubuntu, and Alpine all inherit decades of legacy decisions that weren't designed for containerized workloads. Here's why a hardened minimal base is our foundation—and how it improves your security posture.

Read the full post

All Posts

Engineering8 min read

Why We Built ImageSentinel on a Hardened Minimal Base

Traditional container base images carry unnecessary packages and legacy risk. Here's why a hardened minimal foundation is the right baseline for secure runtime images—and what that means for your security posture.

By Security TeamRead more
Security12 min read

Understanding Software Supply Chain Attacks

From SolarWinds to Log4j, supply chain attacks have become the attack vector of choice for sophisticated adversaries. Learn how to protect your organization with proper container security.

By Security TeamRead more
Engineering10 min read

Implementing SLSA Level 3 for Container Builds

SLSA (Supply-chain Levels for Software Artifacts) provides a framework for securing your build pipeline. Here's how we achieved Level 3 compliance for all ImageSentinel images.

By Platform TeamRead more
Industry6 min read

The True Cost of CVE Patching

Most engineering teams spend 20-30% of their time patching vulnerabilities. We break down the hidden costs and show how automated hardening can give you back your velocity.

By Product TeamRead more
Security9 min read

Sigstore and the Future of Image Signing

Keyless signing is transforming how we verify container image authenticity. Deep dive into how Sigstore works and why it's the right choice for modern container security.

By Security TeamRead more