Cloud Security , Events , Next-Generation Technologies & Secure Development

DevOps, Virtualization and the Case for Containers

Tenable's Gavin Millard on Containers and the Need for Security Visibility
Gavin Millard of Tenable

When asked, "What's your container strategy?" the majority of CISOs will respond by asking: "What's a container?"

See Also: Expel: Firms Still Threatened by Old Vulnerabilities

So says Tenable's Gavin Millard, who sees ongoing confusion about how containers can help organizations continuously deploy code and functionality, as well as how such containers can be securely used.

In a video interview at the recent Infosecurity Europe conference in London, Millard discusses:

  • The need to ensure containers are securely used;
  • The importance of testing containers during the continuous integration and continuous delivery - CICD - process;
  • Why more industries are adopting containers.

Millard serves as the technical director for Europe, the Middle East and Africa at Tenable. An ethical hacker, Millard works with enterprises to address their cybersecurity challenges. He previously worked as the EMEA technical director for Tripwire. Millard regularly speaks on data integrity, hacking and other key security topics.


About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe, ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.