How to Secure Amazon ECS Workloads On Demand

Amazon-ECS-Workloads-On-Demand-BLOG650_315_S.png

In support of Amazon’s announcement this week at re:Invent surrounding the new AWS Container Marketplace, we’ve made the Aqua Container Security Platform available for on-demand consumption (pay[…]

Securing ISV-Provided Container Images

Container security

Containers make it very easy to package and deliver applications, so it’s not surprising that many ISVs (Independent Software Providers) are leading the trend of packaging their software, whether[…]

Report by Gartner Highlights Maturing Options for Securing Containers

Container Secuirty

Gartner recently released a Technical Professional Advice report titled Container Security -- From Image Analysis to Network Segmentation, Options Are Maturing* (by Joerg Fritsch and Michael[…]

Kube-hunter - an open source tool for Kubernetes penetration testing

Kubernetes security

We just released a new free tool called kube-hunter. You give it the IP or DNS name of your Kubernetes cluster, and kube-hunter probes for security issues - it’s like automated penetration[…]

Aqua Integrates with Google’s Cloud Security Command Center

Aqua Integrates with Google’s Cloud Security Command Center (7).png

Good news for those of you running container workloads on GCP - we now provide a nice integration with Google's Cloud Security Command Center. The Cloud SCC provides a centralized,[…]

Taking a Comprehensive Approach to Container Security in 2018 

Taking a Comprehensive Approach to Container Security in 2018 (1).png

In late 2016 we enlisted the help of security analysts and thought leaders Securosis to perform an in-depth best practices analysis of what companies should do to build a security program around[…]

Protecting Hybrid-Cloud Workloads? Lessons from ESG Survey

Protecting Hybrid-Cloud Workloads Lessons from ESG Survey

Today’s #1 Attack: Zero-day exploits of new and previously unknown vulnerability in apps and OSs

Container Security Top Challenges: Lack of adequate and disparate security tools, vulnerabilities[…]

Cryptocurrency Miners Abusing Containers: Anatomy of an (Attempted) Attack

Cryptocurrency Miners Abusing Containers

This isn't a story about a Docker vulnerability; it's a story about how hackers are looking for unsecured Docker deployments where they can mine cryptocurrency. You shouldn't leave your Docker[…]

Do Containers Provide Better Protection Against Meltdown and Spectre?

meltdown_bg.png

About Meltdown and Spectre

Following the trend of ‘branding’ vulnerabilities, Meltdown and Spectre vulnerabilities (CVE-2017-5754, CVE-2017-5753, and CVE-2017-5715) are ‘brand’ names given to[…]

Aqua Secures $25M in Series B Funding

Aqua Secures $25M in Series B Funding - Aleo.png

It’s been less than a year since we announced our Series A round led by Microsoft, and what a year it’s been!

Subscribe to Email Updates