Request a Demo

You can still request to
join our Private Beta. * E-mail is mandatory.

Aqua Blog

A Brief History of Containers: From the 1970s to 2017

history of containers 1970s 2017 docker chroot
Updated as of March 2018.

If you can believe it, this March, Docker will be celebrating five years of existence.

Using Aqua to Secure Applications on Pivotal Cloud Foundry

PCF banner.png

Many organizations use Pivotal Cloud Foundry (PCF), one of the world’s most powerful cloud-native platforms. PCF enables developers and operators to iterate rapidly, and help expand and launch[…]

Aqua 3.0: Kubernetes Security Deep-Dive

Kubernetes native security solution aqua

Since the second half of 2017, Kubernetes has been gaining momentum in adoption as well as in its ecosystem support. We see more and more enterprises choosing Kubernetes for the orchestration of[…]

Revisiting AWS Fargate with Aqua 3.0

AWS Fargate CaaS microenforcer

A few months ago I was lucky enough to get my hands on Fargate when it was in preview in the run-up to AWS re:invent. It was immediately clear that it’s a pretty cool concept, and that it presents[…]

Protecting Hybrid-Cloud Workloads? Lessons from ESG Survey

Protecting Hybrid-Cloud Workloads Lessons from ESG Survey

Today’s #1 Attack: Zero-day exploits of new and previously unknown vulnerability in apps and OSs

Container Security Top Challenges: Lack of adequate and disparate security tools, vulnerabilities[…]

10 Essential Container CI/CD Tools

10 Container CI CD Tools

Continuous integration and continuous delivery (CI/CD) are two of the biggest trends in software development. As companies move to release higher quality software at a faster pace, developers and[…]

Cryptocurrency Miners Abusing Containers: Anatomy of an (Attempted) Attack

Cryptocurrency Miners Abusing Containers

This isn't a story about a Docker vulnerability; it's a story about how hackers are looking for unsecured Docker deployments where they can mine cryptocurrency. You shouldn't leave your Docker[…]

Preparing Container-Based Applications for GDPR: What You Need to Know

Preparing Container-Based Applications for GDPR_ What You Need to Know (1)-1.png

The General Data Protection Regulation (GDPR), set to replace the European Data Protection Directive 95/46/EC, comes into effect in May 2018. GDPR is intended to protect the privacy of EU[…]

Which Kubernetes Management Platform is Right for Your Enterprise?

9 Enterprise Kubernetes Management Platforms.png

It is clear that 2017 was the year that Kubernetes underwent explosive growth, emerging as the clear winner in the battle between orchestration tools. In a survey by 451 Research, 71% of IT[…]

eBPF Vulnerability (CVE-2017-16995): When the Doorman Becomes the Backdoor

ebpf vulnerability backdoor

Co-written by Nahman Khayet and Michael Cherny

eBPF Verifier Bypass Vulnerability

Around the last week of December a tweet by Bruce Leidl caught our eyes, since it said “Straight up unlimited R/W[…]