@@ -29,24 +29,23 @@ params:
2929
3030When container images are insecure, significant risks can arise. Around 60% of
3131organizations have reported experiencing at least one security breach or
32- vulnerability incident within a year, resulting in operational
33- disruption. [ ^ CSA ] These incidents often result in considerable downtime, with
32+ vulnerability incident within a year, [ resulting in operational
33+ disruption] [ CSA ] . These incidents often result in considerable downtime, with
343444% of affected companies experiencing over an hour of downtime per event. The
35- financial impact is substantial, with the average data breach cost reaching
36- $4.45 million. [ ^ IBM ] This highlights the critical importance of maintaining
35+ financial impact is substantial, with [ the average data breach cost reaching
36+ $4.45 million] [ IBM ] . This highlights the critical importance of maintaining
3737robust container security measures.
3838
3939Docker Scout enhances container security by providing automated vulnerability
4040detection and remediation, addressing insecure container images, and ensuring
4141compliance with security standards.
4242
43- [ ^ CSA ] : https://cloudsecurityalliance.org/blog/2023/09/21/2023-global-cloud-threat-report-cloud-attacks-are-lightning-fast
44-
45- [ ^ IBM ] : https://www.ibm.com/reports/data-breach
43+ [ CSA ] : https://cloudsecurityalliance.org/blog/2023/09/21/2023-global-cloud-threat-report-cloud-attacks-are-lightning-fast
44+ [ IBM ] : https://www.ibm.com/reports/data-breach
4645
4746## What you'll learn
4847
49- - Define secure software supply chain (SSSC)
48+ - Define Secure Software Supply Chain (SSSC)
5049- Review SBOMs and how to use them
5150- Detect and monitor vulnerabilities
5251
0 commit comments