When we build containers, we primarily control what’s going on. Once pushed to the registry, it is considered stable and safe.
Docker tags are not as stable as we like to think they are.
This edition comes with Kubernetes, AWS and the always forgotten HTTP security…
A supply chain attack is when one or more of the dependencies in your application have been compromised, and some “bad code “is running on your systems and applications that is intended to harm you. These kinds of attacks are becoming more common and more sophisticated.