gray

Docker Resources

A resource library to inspire developers and businesses

Explore materials to accelerate how you build, share, run, and test applications

Filters

Reset

Date

Type

Tags

All resources

Video

DHI ELS Launch

Docker Hardened Images are now freely available, raising the security baseline across the software supply chain.

White Paper

Building Faster, Securing Smarter: How Attentive Eliminated 90% of CVEs with Docker Hardened Images

Discover how Attentive cut 90 percent of CVEs, shrank image sizes, and sped up builds using Docker Hardened Images.

Video

MCP 201: Advanced Developer Use Cases for MCP

Join us for a live, hands-on session where we’ll explore advanced MCP use cases.

Video

Level Up Your Local AI Workflows with Model Runner

Learn how to run multi-modal models on virtually any GPU, streamline model distribution, and simplify collaboration across teams with Docker Model Runner.

Video

Docker at AWS re:Invent

A preview of what Docker is bringing to re:Invent 2025, including new DHI capabilities, Secure Build enhancements, and AI workflow integrations. This session also offered early access to upcoming partner and ecosystem announcements.

Video

Building the Supply Chain for the Future and How to Get There

Developers often bypass security when controls add friction, alerts are noisy, or enforcement is inconsistent. This session shows how Docker Hardened Images create a secure by default developer experience that cuts noise with complete SBOMs and OpenVEX, reduces drift with ultra minimal images, and standardizes controls with a secure policy in CI and CD that enforces Cosign signatures and SLSA Build Level 3 provenance.

Analyst Study

Docker Economic Validation by theCUBE Research [eBook]

This ebook takes a deep dive into Docker’s business value through measurable gains in product time-to-market, cost efficiency, secure software supply chain, and agentic AI development.

Video

Containers are the new Supply Chain Attack Vector

In this session, we will take a look at Docker’s five pillars for supply chain security. We look at how these pillars provide a common language for platform, security, and app teams. We will outline why minimal, non-root defaults cut exposure, why complete SBOMs and SLSA Level 3 provenance form a shared source of truth, and how signatures make policy enforceable across registries.