security
-
May 13, 2026
NIST Narrows the NVD: What Container Security Programs Should Reassess
On April 15, NIST announced a prioritized enrichment model for the National Vulnerability Database. Most CVEs will still be published, but fewer will receive the CVSS scores, CPE mappings, and CWE classifications that container scanners and compliance programs have historically relied on. The change formalizes a drift that has been visible to anyone pulling NVD…
Read now
-
May 12, 2026
Docker AI Governance: Unlock Agent Autonomy, Safely
Introducing Docker AI Governance: centralized control over how agents execute, what they can reach on the network, which credentials they can use, and which MCP tools they can call, so every developer in your company can run AI agents safely, wherever they work. Your laptop is the new prod Agents are the biggest productivity unlock…
Read now
-
Apr 30, 2026
From Security Blocked to Prod Ready: ClickHouse on Docker Hardened Images
Learn how Docker Hardened Images help run ClickHouse in production by reducing CVEs and improving container security without changing your workflow.
Read now
-
Mar 13, 2026
Secure Agent Execution with NanoClaw and Docker Sandboxes
NanoClaw integrates with Docker Sandboxes to run AI agents in disposable MicroVMs, combining transparency and isolation for secure execution.
Read now
-
Mar 3, 2026
Announcing Docker Hardened System Packages
Secure your container stack from the base image down. Docker Hardened System Packages offer multi-distro, secure-by-default components with near-zero CVEs.
Read now
-
Guest Contributor Feb 19, 2026
How Medplum Secured Their Healthcare Platform with Docker Hardened Images (DHI)
See how Medplum cut CVE noise and strengthened HIPAA/SOC 2 compliance using Docker Hardened Images—non-root by default, minimal code changes.
Read now
-
Feb 10, 2026
Hardened Images Are Free. Now What?
Docker Hardened Images are now free. Learn the waterline model, supply chain isolation, VEX, and policy automation to cut CVE noise and meet compliance.
Read now
-
Feb 3, 2026
The 3Cs: A Framework for AI Agent Security
Every time execution models change, security frameworks need to change with them. Agents force the next shift. The Unattended Laptop Problem No developer would leave their laptop unattended and unlocked. The risk is obvious. A developer laptop has root-level access to production systems, repositories, databases, credentials, and APIs. If someone sat down and started using…
Read now