Container security: How Waratek blocks Java exploits

In general, container cybersecurity works by creating a virtual machine to host a protected application and then restricting what it can do to reach out of that container. Because of its reliance on virtual machines, containerization only recently became popular because of cloud computing, which also relies heavily on virtualization.

To read this article in full or to leave a comment, please click here

(Insider Story)