Conceptual
How End-of-Life Software Accumulates Vulnerabilities
A conceptual article outlining the risk involved with using EOL software and how EOL images accrue vulnerabilities.
Migrating to Node.js Chainguard ImagesGuidance on how to migrate Node.js Dockerfile workloads to use Chainguard Images
Debian CompatibilityDifferences between Chainguard Images and Debian third-party images
What are Containers?An overview of the structure, contents, and applications of container technology
Selecting a Base ImageCriteria for selecting a base image
What is software supply chain securitySoftware supply chain security - an explanation
What Makes a Good SBOM?An explanation of what makes a good SBOM