Last month, the Codecov breach has again raised concerns about the security of the software supply chain. On our blog, we share the lessons from this incident and explore how you can start protecting your development pipeline against CI poisoning and supply chain attacks. On the cloud threat front, our latest research reveals 90% of companies are vulnerable to security breaches …
Kubernetes has lots of native security controls that require proper configuration and fine-tuning over time. The community commitment to the platform’s security has also led to the creation of various commercial and open source tools for further ensuring the security of your applications and environment. Kube-hunter is a good example: it’s an open source tool for pen-testing …
A development team can make cloud configuration decisions or apply services that impact an organization’s security posture, said Assaf Morag, lead data analyst with Aqua’s cybersecurity research team. But, organizations that centralize cloud security controls can take steps to optimize their security posture.
BOSTON – May 10, 2021 — Aqua Security, the pure-play cloud native security leader, today announced that CRN®, a brand of The Channel Company, has named Sarah Goodchild, Director, Worldwide Partner Sales for Aqua, to the highly respected Women of the Channel list for 2021 for the second consecutive year. This annual list recognizes the …
The data demonstrates that companies face significant challenges in correctly configuring their cloud environments, undermining the security of their cloud infrastructure, says Ehud Amiri, senior director of product management at Aqua Security.
“When you consider that a single cloud misconfiguration can expose organizations to severe cyber risk, such as data breaches, resource hijacking and denial of service attacks, the consequences of failing to address misconfiguration issues are all too real to ignore,” said Assaf Morag, Lead Data Analyst with Aqua’s Team Nautilus.
“The more people you have accessing [your cloud] and the more accounts you set up, the more you have to consider,” said Michelle Peterson, product owner of Benchmarks, the non-profit Center for Internet Security’s guidance on how to navigate the cloud service provider market. “It’s not just a small group [anymore] utilizing these resources, but …
Ehud Amiri, senior director of product management for Aqua Security, said the mystery is why so many of those misconfigured API and cloud services are not being fixed when organizations have the tools to discover them. Most of these issues stem from the simple fact that, in the era of the cloud, developers are using …