Products
-
May 15, 2026
Custom MCP Catalogs and Profiles: Advancing Enterprise MCP Adoption
Learn how to create your own custom MCP catalog and maintain separate server collections and configurations for smooth transitions between workflows.
Read now
-
May 13, 2026
NIST Narrows the NVD: What Container Security Programs Should Reassess
On April 15, NIST announced a prioritized enrichment model for the National Vulnerability Database. Most CVEs will still be published, but fewer will receive the CVSS scores, CPE mappings, and CWE classifications that container scanners and compliance programs have historically relied on. The change formalizes a drift that has been visible to anyone pulling NVD…
Read now
-
May 12, 2026
Docker AI Governance: Unlock Agent Autonomy, Safely
Introducing Docker AI Governance: centralized control over how agents execute, what they can reach on the network, which credentials they can use, and which MCP tools they can call, so every developer in your company can run AI agents safely, wherever they work. Your laptop is the new prod Agents are the biggest productivity unlock…
Read now
-
May 5, 2026
Generate Images Locally with Docker Model Runner and Open WebUI
Learn how to generate images locally with Docker Model Runner and Open WebUI using a private, OpenAI-compatible workflow on your own machine.
Read now
-
Scanner Integrations May 5, 2026
Precision Container Security with Docker and Black Duck
The complexity of modern containerized applications often leaves developers drowning in a sea of “noise”—vulnerabilities that exist in the file system but pose zero actual risk to the application. The integration between Black Duck and Docker Hardened Images (DHI) provides a definitive answer to this challenge. By combining Docker’s secure-by-default foundations, using VEX (Vulnerability Exploitability…
Read now
-
Apr 16, 2026
Why MicroVMs: The Architecture Behind Docker Sandboxes
Last week, we launched Docker Sandboxes with a bold goal: to deliver the strongest agent isolation in the market. This post unpacks that claim, how microVMs enable it, and some of the architectural choices we made in this approach. The Problem With Every Other Approach Every sandboxing model asks you to give something up. We…
Read now
-
Apr 14, 2026
Why We Chose the Harder Path: Docker Hardened Images, One Year Later
We’re coming up on a year since launching Docker Hardened Images (DHI) this May, and in this blog we celebrate the milestones, talk about our approach, and look at some practices in the industry.
Read now
-
Apr 8, 2026
Reclaim Developer Hours through Smarter Vulnerability Prioritization with Docker and Mend.io
We recently announced the integration between Mend.io and Docker Hardened Images (DHI) provides a seamless framework for managing container security. By automatically distinguishing between base image vulnerabilities and application-layer risks, it uses VEX statements to differentiate between exploitable vulnerabilities and non-exploitable vulnerabilities, allowing your team to prioritize what really matters. TL;DR: The Developer Value Proposition…
Read now