Aqua Blog
Experts insight, best practices and advice on cloud native security, trends, threat intelligence and compliance
Container secrets (2).png

Keys, Tokens and Too Much Trust Found in Popular Container Images

This article was originally published in HelpNetSecurity.com

We are all aware of the risks introduced by good old third party code. Where would we be without it? Apparently not very far: It is estimated that between 30 to 70 percent of code comes …

Continue reading ›
Multi Tenancy

Announcing Aqua CSP 2.5: Multi-Tenant Security Management for Containers

We’re glad to announce version 2.5 of the Aqua Container Security Platform, which includes hundreds of improvements and new features. Our main focus has been on making the platform more scalable for our customer deployments, which include some of …

Continue reading ›
hipaa compliance for containers.png

Achieving HIPAA Compliance for Containers: Impact Analysis and Best Practices

Since 1996, the HIPAA act has mandated how personal health information (PHI) should be secured and protected from prying eyes. HIPAA requirements changed how companies in the healthcare industry treat patient data, as well as the processes …

Continue reading ›
Top Aqua Security blogs.png

Top 5 Aqua Blogs!

We wrote them and you loved them. Here’s a recap of the posts you shared, engaged, tweeted, liked, repurposed and gave us feedback on the most. So if you’ve been searching for updates about the container ecosystem, look no further, these are the …

Continue reading ›
delivering trustworthy computing.png

Finally Delivering on Bill Gates’s Trustworthy Computing

[ Upesh recently joined the Aqua team as our VP of Business Development. Upesh has an amazing track record in the cybersecurity space in getting innovative start-ups embedded with major IT vendors and ecosystem players. This is his “30 days at …

Continue reading ›
Red Hat OpenShift

Securing Containers on OpenShift

Red Hat OpenShift container platform is one of the popular and mature platforms for developing and managing container deployments. While it has many built-in security features, Aqua provides an additional layer of security both in development as …

Continue reading ›
Container Security Automation

Container Security Automation: Keeping Up With The DevOps Crowd

This article was originally published in InfoWorld.com, New Tech Forum

From development to deployment, one of the most distinctive traits of using containers is speed. The development cycle is not only rapid, but divided into multiple, …

Continue reading ›
RSAC 2017 container security

RSAC 2017 Presentation Video: Containers - The Dr. Jekyll and Mr. Hyde of Security

At the RSA conference last February, our very own Tsvi Korren packed a room full of more than 400 security pros who came to get the lowdown on container security. This session is now available online.

Continue reading ›
blog-secrets-2.png

Managing Secrets in Docker Containers

In our many conversations with customers, secrets management has come up as a particularly thorny issue that seemed to lack an elegant, cross-platform solution for container environments. Not a new issue in the enterprise space, especially as …

Continue reading ›
Security Terms DevOps

10 Key Security Terms DevOps Need to Know

It’s no secret that DevOps and IT security, like oil and water, are hard to mix. After all, DevOps is all about going fast, while security is all about proceeding carefully. However, both DevOps and security serve a higher authority—the …

Continue reading ›
10 Milestones in The Container Ecosystem

The Year That Was (Almost) - 10 Milestones in The Container Ecosystem

2016 was a big year for the virtual container space, and 2017 looks even more promising. The industry saw tremendous growth and continues to evolve at a rapid pace. Containers, being still relatively new, present new challenges in security -- but …

Continue reading ›