Subscribe to the feed

This week we asked ourselves a critical container question. What is the command that's used to make containers completely?

We've covered the many aspects of Container Security in previous shows, but over the last couple of weeks it seemed like the community was starting to believe that many VMs were the silver bullet for container security. We spend most of the show talking about defense-in-depth and the pros and cons of using VMs as for isolation and security. Sometimes the show gets a little ranty, so bear with us.

The show will always be available on this blog (search: #PodCTL), as well as RSS FeedsiTunesGoogle PlayStitcherTuneIn and all your favorite podcast players.


About the author

UI_Icon-Red_Hat-Close-A-Black-RGB

Browse by channel

automation icon

Automation

The latest on IT automation for tech, teams, and environments

AI icon

Artificial intelligence

Updates on the platforms that free customers to run AI workloads anywhere

open hybrid cloud icon

Open hybrid cloud

Explore how we build a more flexible future with hybrid cloud

security icon

Security

The latest on how we reduce risks across environments and technologies

edge icon

Edge computing

Updates on the platforms that simplify operations at the edge

Infrastructure icon

Infrastructure

The latest on the world’s leading enterprise Linux platform

application development icon

Applications

Inside our solutions to the toughest application challenges

Original series icon

Original shows

Entertaining stories from the makers and leaders in enterprise tech