Aqua Blog

Cloud security

Cloud Workload Security: Aqua Shines in GigaOm's Radar Report

Cloud Workload Security: Aqua Shines in GigaOm's Radar Report

Cloud workload security (CWS) plays a critical role in safeguarding the integrity and resilience of cloud-native workloads. Defined through the lens of GigaOm, CWS primarily revolves around fortifying the dynamic and continuously evolving workloads within cloud environments. Its significance lies in bolstering …

Continue reading ›
A Nightmare on C-Suite: 6 Cloud Security Slashers in Your Organization

A Nightmare on C-Suite: 6 Cloud Security Slashers in Your Organization

In honor of October, known as National Cyber Security Month and more notably as today is Halloween, we thought we would have some fun with our blog and give you a tale of cyber security terror! 

Deep within the cryptic corners of a cluttered server room, the fate of your business teeters on a tantalizing tightrope, …

Continue reading ›
Conquer Cloud Security Risk: Introducing Real-Time CSPM

Conquer Cloud Security Risk: Introducing Real-Time CSPM

What if someone handed you a static picture of a highway and asked you to drive using only the picture? Would you still drive even if you knew you could not see all the traffic around you? 

Yet traditional CSPM solutions show the state of your environment as a snapshot in time, usually once per day, only giving you …

Continue reading ›
Debunking the Top Cloud Native Security Myths

Debunking the Top Cloud Native Security Myths

There is no shortage of myths in cloud native security, and we made our own list of the top seven cloud native security myths. Achieving compliance in the cloud and cloud providers’ responsibilities are the top two from that list.
Continue reading ›
Aqua Integrates with Google’s Cloud Security Command Center

Aqua Integrates with Google’s Cloud Security Command Center

Good news for those of you running container workloads on GCP - we now provide a nice integration with Google's Cloud Security Command Center. The Cloud SCC provides a centralized, single-pane-of-glass view of all security data for GCP applications, and providing actionable insights. It includes things like access …

Continue reading ›
Cloud Operations Will Depend on Virtualized Containers in 2016

Cloud Operations Will Depend on Virtualized Containers in 2016

This is the first in a two-part post. In this first part, I’d like to discuss how mainstream use of the cloud has turned the spotlight on the value of containers and the need to secure them. 

Continue reading ›