Request a Demo

You can still request to
join our Private Beta. * E-mail is mandatory.

Aqua Blog

What to Look Forward to at DockerCon 2017

DockerCon is THE show for anything container-related, and no wonder it’s been growing from year to year. It is a conference that draws in some of the brightest minds in the Docker ecosystem to[…]

Security Best Practices for Kubernetes: Redux

Last week I presented at the NY Kubernetes meetup on security best practices. 

Don't Leave Your Keys Exposed: Lessons from IBM Privilege Escalation Flaw

Would you ever give your keys to a stranger? That’s exactly what someone at IBM did: they left private keys to the Docker host environment in IBM’s Data Science Experience service accessible to[…]

Network Nano-Segmentation for Container Security in Aqua 2.0

Network segmentation is not a new concept in security. It’s been around for a while and is considered one of the most effective methods of limiting the “blast radius”, i.e., preventing extensive[…]

Managing Secrets in Docker Containers

In our many conversations with customers, secrets management has come up as a particularly thorny issue that seemed to lack an elegant, cross-platform solution for container environments. Not a[…]

Set DevSecOps in Motion with Minimal Commotion

DevOps professionals continue to believe they can’t do their jobs properly because security slows down operations. Security pros, meanwhile, have largely failed to integrate security measures into[…]

Assembling a Container Security Program

As excitement around container technology continues to grow, many questions remain regarding the best way to secure them from both a technical and organizational perspective. While developers and[…]

CVE-2016-9962: Run Container Run

RunC Like the Wind

Recently, an interesting vulnerability was discovered (CVE-2016-9962) that enables container escape to the host. The vulnerability stems from a bug found in opencontainers' runc[…]

Container Events Not to be Missed in 2017

Last year I said the technology sector was notorious for hosting too many conferences. This holds true this year as well. The challenge is finding the right ones where container proponents and[…]

Cisco CloudCenter Orchestrator Docker Privilege Escalation Vulnerability Explained

Cisco announced a few days ago that it discovered and fixed a critical vulnerability in its CloudCenter Orchestrator, whereby a misconfiguration caused the Docker Engine management port to be[…]