Request a Demo

You can still request to
join our Private Beta. * E-mail is mandatory.

Aqua Blog

Docker Security Best Practices 2017

I recently attended a webinar in which one of the speakers said that a ‘container is never going to be as secure as a virtual machine’. I beg to differ. Docker containers are not inherently less[…]

Security Best Practices for Kubernetes: Redux

Last week I presented at the NY Kubernetes meetup on security best practices. 

Don't Leave Your Keys Exposed: Lessons from IBM Privilege Escalation Flaw

Would you ever give your keys to a stranger? That’s exactly what someone at IBM did: they left private keys to the Docker host environment in IBM’s Data Science Experience service accessible to[…]

Network Nano-Segmentation for Container Security in Aqua 2.0

Network segmentation is not a new concept in security. It’s been around for a while and is considered one of the most effective methods of limiting the “blast radius”, i.e., preventing extensive[…]