Request a Demo

You can still request to
join our Private Beta. * E-mail is mandatory.

Aqua Blog

BlackHat 2017: Multi-Stage Attack Targeting Container Developers, Presented by Aqua

In just about a week we will be live on stage at BlackHat 2017 with this tersely titled talk: Well that Escalated Quickly! How Abusing Docker API Led to Remote Code Execution Same Origin Bypass and[…]

Announcing Kube-Bench: An Open Source Tool for Running Kubernetes CIS Benchmark Tests

The Center for Internet Security provides a number of guidelines and benchmark tests for best practices in securing your code. As Michael Cherny recently described, the CIS has recently published[…]

How to Get Started with Containerization

This article was originally published in infoworld.com

As part of my job, I regularly meet with devops people to discuss their container strategy. Most of the time, the people I talk to are eager[…]

Keys, Tokens and Too Much Trust Found in Popular Container Images

This article was originally published in HelpNetSecurity.com

We are all aware of the risks introduced by good old third party code. Where would we be without it? Apparently not very far: It is[…]

Announcing Aqua CSP 2.5: Multi-Tenant Security Management for Containers

We’re glad to announce version 2.5 of the Aqua Container Security Platform, which includes hundreds of improvements and new features. Our main focus has been on making the platform more scalable[…]

Docker Security Best Practices 2017

I recently attended a webinar in which one of the speakers said that a ‘container is never going to be as secure as a virtual machine’. I beg to differ. Docker containers are not inherently less[…]

Securing Container Deployments on Bluemix with Aqua Security

The security of enterprise software has never been more important. As more and more enterprises move to container-based deployments in the public or hybrid cloud, there are increasing numbers of[…]

Achieving HIPAA Compliance for Containers: Impact Analysis and Best Practices

Since 1996, the HIPAA act has mandated how personal health information (PHI) should be secured and protected from prying eyes. HIPAA requirements changed how companies in the healthcare industry[…]

CIS Benchmark for Kubernetes 1.6

The Center for Internet Security (CIS) published a new banchmark last week for Kubernetes 1.6. As the adoption of container technologies grows rapidly, orchestrators have become a key enabler,[…]

Top 5 Aqua Blogs!

We wrote them and you loved them. Here’s a recap of the posts you shared, engaged, tweeted, liked, repurposed and gave us feedback on the most. So if you’ve been searching for updates about the[…]