Aqua Blog

Container Security

Cryptocurrency Miners Abusing Containers

Cryptocurrency Miners Abusing Containers: Anatomy of an (Attempted) Attack

This isn't a story about a Docker vulnerability; it's a story about how hackers are looking for unsecured Docker deployments where they can mine cryptocurrency. You shouldn't leave your Docker daemon unsecured  any more than you would leave your mail server unsecured.

We’ve heard many accounts of attempted …

Continue reading ›
meltdown_bg.png

Do Containers Provide Better Protection Against Meltdown and Spectre?

About Meltdown and Spectre

Following the trend of ‘branding’ vulnerabilities, Meltdown and Spectre vulnerabilities (CVE-2017-5754, CVE-2017-5753, and CVE-2017-5715) are ‘brand’ names given to currently known variants of vulnerabilities of a similar nature, related to speculative execution. The general idea is …

Continue reading ›
Aqua Secures $25M in Series B Funding - Aleo.png

Aqua Secures $25M in Series B Funding

It’s been less than a year since we announced our Series A round led by Microsoft, and what a year it’s been!

Continue reading ›
Container secrets (2).png

Keys, Tokens and Too Much Trust Found in Popular Container Images

This article was originally published in HelpNetSecurity.com

We are all aware of the risks introduced by good old third party code. Where would we be without it? Apparently not very far: It is estimated that between 30 to 70 percent of code comes from 3rd party applications. This is why we patch up old libraries …

Continue reading ›
Multi Tenancy

Announcing Aqua CSP 2.5: Multi-Tenant Security Management for Containers

We’re glad to announce version 2.5 of the Aqua Container Security Platform, which includes hundreds of improvements and new features. Our main focus has been on making the platform more scalable for our customer deployments, which include some of the world’s largest container setups.

Continue reading ›
HIPAA Compliance for Containers

HIPAA Compliance for Containers: Impact Analysis and Best Practices

Since 1996, the HIPAA act has mandated how personal health information (PHI) should be secured and protected from prying eyes. HIPAA requirements changed how companies in the healthcare industry treat patient data, as well as the processes governing it, the applications that handle it, and the infrastructure that …

Continue reading ›
Top 5 Aqua Security Blogs

Top 5 Aqua Blogs!

We wrote them and you loved them. Here’s a recap of the posts you shared, engaged, tweeted, liked, repurposed and gave us feedback on the most. So if you’ve been searching for updates about the container ecosystem, look no further, these are the top 5 Aqua blog posts.

Continue reading ›
Delivering Trustworthy Computing

Finally Delivering on Bill Gates’s Trustworthy Computing

[ Upesh recently joined the Aqua team as our VP of Business Development. Upesh has an amazing track record in the cybersecurity space in getting innovative start-ups embedded with major IT vendors and ecosystem players. This is his “30 days at Aqua” blog  - Rani ]

How long have security practitioners been trying to …

Continue reading ›
Red Hat OpenShift

Securing Containers on OpenShift

Red Hat OpenShift container platform is one of the popular and mature platforms for developing and managing container deployments. While it has many built-in security features, Aqua provides an additional layer of security both in development as well as for protecting containerized applications in runtime.

Continue reading ›
Container Security Automation

Container Security Automation: Keeping Up With The DevOps Crowd

This article was originally published in InfoWorld.com, New Tech Forum

From development to deployment, one of the most distinctive traits of using containers is speed. The development cycle is not only rapid, but divided into multiple, bite-sized components that are constantly updated. At runtime, frequent …

Continue reading ›
RSAC 2017 container security

Containers - The Dr. Jekyll and Mr. Hyde of Security

At the RSA conference last February, our very own Tsvi Korren packed a room full of more than 400 security pros who came to get the lowdown on container security. This session is now available online.

Continue reading ›

Subscribe to Email Updates

Popular Posts