Mobile SDKs (software developments kits); love them or hate them, they're here to stay. They provide our apps with all sorts of functionality that would be incredibly time consuming to build, and they give us another means to monetize our apps. While it would be difficult to argue that SDKs aren’t useful, it’s also hard for developers to get a good idea of the amount of resources used by each SDK once the app is in production ...
Tripwire announced that Tripwire IP360 now scans for vulnerabilities on non-running Docker containers.
This expansion builds upon Tripwire’s existing ability to scan running containers, making Tripwire IP360 truly integrated with advanced container scanning capabilities. This release provides security teams with visibility into DevOps processes.
Tripwire IP360 now allows customers to scan online, offline and non-running containers for vulnerabilities, giving them an enhanced overall view and lowering the chance that vulnerabilities will slip through the cracks during the development stage and into production. This new feature offers stronger security for DevOps processes, whether on-premise or in the cloud.
“Containers, which are lightweight self-contained virtual images designed to execute specific tasks or applications repeatedly and reliably, are often switched from non-running to running and vice versa as they are needed. It’s important to scan containers for vulnerabilities no matter what state they are in and to do so regularly because they can be updated often, even in production,” said Lamar Bailey, Senior Director of Engineering at Tripwire. “Tripwire IP360 now makes it possible to quickly and reliably scan all Docker containers, whether running or not, which is necessary to reduce the risk of a security breach.”
DevOps teams’ increasing use of containers to accelerate software development and deployment has added complexity for security teams.
Bailey added: “Enterprise IT security executives are responsible for actively and continuously reducing security risk to their businesses, which means assessing all of the components on their networks for vulnerabilities. Containers are no exception, so it’s important to have thorough vulnerability assessment tools for these as well.”