What is Docker using to ensure a secure environment and how you can use Docker's internals to create security policies in the application level?
This a presentation I gave during the Docker Athens Meetup based on the security aspect of Docker: www.meetup.com/Docker-Athens/events/227431027/