Aqua Security has announced that Trivy, their open source vulnerability scanner, is now available as an integrated option within a number of platforms. Trivy is able to scan for vulnerabilities within operating systems and a number of common application dependencies. With this announcement, Trivy is now included within Harbor as the default scanner. Harbor is an open source container …
As many organizations have been forced to make a rapid shift to work-from-home to help control the spread of COVID-19, a significant percentage of IT and cloud professionals are concerned about maintaining the security of their cloud environments during this period. Even otherwise, security has always been a prime concern for CIO/CISOs with more organizations …
Aqua Security today added container threat analysis to its Cloud Native Security Platform and Cloud Security Posture Management products. The new product, Dynamic Threat Analysis (DTA), protects containerized applications from image-based malware by automatically running images in a secure sandboxed environment. It then analyzes image runtime behavior and checks for anomalies and can perform forensics after a suspected incident. And …
First ‘Sandbox’ for Containerized Applications is Integrated into Aqua’s Cloud Native Security Platform and Cloud Security Posture Management (CSPM) Solutions BOSTON – 22 April, 2020 – Aqua Security, the leading platform provider for securing cloud native applications and infrastructure, announced today Aqua Dynamic Threat Analysis (DTA), a new product offering that protects container-based environments against …
Aqua Security today launched a tool today that dynamically scans container environments to discover more sophisticated forms of malware that often elude static analysis tools. Rani Osnat, vice president of strategy for Aqua Security, says Aqua Dynamic Threat Analysis (DTA) will be available as both a standalone tool and as an option of the Aqua Cloud Native …
Kubernetes’ reputation as a powerful platform, especially for cloud-native applications, is deserved. It offers a rich, flexible set of capabilities. This reputation also includes a learning curve that can be steep for beginners, especially if you’re trying to go it your own way with the open source platform. “Kubernetes is deceptively simple to set up initially, but then …
For the past few months, a malware operation has been scanning the internet for Docker servers running API ports exposed on the internet without a password. Hackers are then breaking into unprotected hosts and installing a new crypto-mining malware strain named Kinsing. Attacks began last year and are still ongoing, according to cloud security firm …
“As the adoption of Kubernetes and deployment of container-based applications in production accelerate to much higher volumes than we’ve seen to date, we can expect more security incidents to occur,” says Rani Osnat, VP of strategy at Aqua Security. “Most of those will be caused by the knowledge gap around what constitutes secure configuration, and lack …