Top 3 Considerations for Container Scanning


May 2, 2023
10:00 am PDT

Software supply chain attacks are on the rise as organizations leverage open source software. It gives attackers a potential path to insert malicious code in container images. Organizations need to assess every image’s components for known vulnerabilities and take corrective action.

In this webinar, you will learn that detecting common CVEs in images and blocking their deployment requires answers to the following questions:

  • Should you scan all container images before deployment?
  • Should you customize admissions controller criteria to control the deployment of images? 
  • Should you block all images with vulnerabilities from getting deployed?


Dhiraj Sehgal Director of Product Marketing, Tigera
Chris Man Solutions Architect, Tigera


Join our mailing list​

Get updates on blog posts, workshops, certification programs, new releases, and more!