Aqua Blog
Experts insight, best practices and advice on cloud native security, trends, threat intelligence and compliance
Container Security Openshift

Streamline Image Vulnerability Management for OpenShift Image Streams

In traditional cloud native environments, actions such as building and deploying applications will usually involve working directly with images hosted in one or more registries. Customers wishing to track changes in those images, in order to …

Continue reading ›
Container security

Securing ISV-Provided Container Images

Containers make it very easy to package and deliver applications, so it’s not surprising that many ISVs (Independent Software Providers) are leading the trend of packaging their software, whether it’s commercial off-the-shelf (COTS) or …

Continue reading ›
Blog-pic-Microscanner-Jenkins_2.png

Aqua MicroScanner: Free Image Vulnerability Scanning Plugin for Jenkins

A few weeks ago we released Aqua MicroScanner, a free vulnerability scanner that you can embed into the dockerfile and automate scanning during image build.

Continue reading ›
Aqua’s new MicroScanner_ Free Image Vulnerability Scanner for Developers

Aqua’s New MicroScanner: Free Image Vulnerability Scanner for Developers

At Aqua we’ve been working on a new, free-to-use tool for scanning your container images for package vulnerabilities. MicroScanner uses the same vulnerability database as Aqua’s best-in-class commercial scanner, so you’re getting top-notch …

Continue reading ›
PCF banner.png

Using Aqua to Secure Applications on Pivotal Cloud Foundry

Many organizations use Pivotal Cloud Foundry (PCF), one of the world’s most powerful cloud-native platforms. PCF enables developers and operators to iterate rapidly, and help expand and launch new businesses fast, as well as deliver …

Continue reading ›
Applying Multiple Security Policies to Images in Your Pipeline - Blog Banner (1).png

Applying Multiple Security Policies to Images in Your Pipeline to Improve Speed and Efficiency

When it comes to securing containerized applications, the first item on everyone’s agenda is to ensure that only trusted images are running in your environment, based on security and compliance policies. And for good reason too. This is by far …

Continue reading ›
Grafeas and Image Vulnerability Scanning

Grafeas and Image Vulnerability Scanning

A couple of months ago Aqua Security were part of a group of companies supporting the launch of Grafeas, an open source API initially introduced by Google that allows users to manage and query metadata about software artifacts. We wrote an …

Continue reading ›
blog AWS PrivateLink.png

Image Scanning in VPCs with Aqua and AWS PrivateLink

Amazon Web Services announced today at re:Invent an to a recent feature PrivateLink, that enables AWS Virtual Private Cloud customers to consume apps outside their VPCs through service endpoints, using their own private IP addresses and security …

Continue reading ›
blog-pps.png

How Aqua Scans Container Images On-Demand From The AWS Marketplace

Today we announced the availability of a new offering on AWS - our on-demand, pay-per-scan security scanner for container images is now available in the AWS Marketplace. The scanner is a full-featured version of Aqua's image scanning capabilities …

Continue reading ›
Container Security in The Enterprise Survey- Detecting Vulnerabilities in Images and Secrets Management Are Top Focus Areas – For Now (2).png

Survey Reveals: Detecting Vulnerabilities in Images and Managing Secrets Are Top Focus

Last month at DockerCon Europe we learned that container adoption is rising to a whole new level with 24 billion container downloads and 77K% growth in Docker job listings. This is when Docker also announced that it now supports Kubernetes. …

Continue reading ›
grafeas_bg.png

Governance and Control for The Container Supply Chain Using Aqua Security and Google Grafeas

Securing software supply chains requires strong governance and rich data, both to help ensure that only approved components are executed on production machines.

Continue reading ›