The new component uses automated vulnerability and component analysis to come up with runtime policies that give users a way of blocking access to vulnerable container components. This isn’t meant to be used as a permanent solution, but it can take a bit of the load off developers’ shoulders until there’s time to actually patch […]
Aqua Security has extended its container security platform to include a virtual patching capability, dubbed Vulnerability Shield, which enables DevSecOps teams to temporarily block access to software components until a patch can be delivered. At the same time, version 4.2 of Aqua CSP, its cloud-native security platform, has been enhanced to provide runtime protection for serverless […]
Fernando Montenegro, senior analyst for information security at 451 Research, explained that this virtual patching also hits at the heart of an ongoing battle within the container security space. “This notion of just patching something is fundamental, but it’s also hard to do at scale, It’s almost one of those religious debates in the industry, […]
With a centralized configuration tool like Config Management, enterprise tools such as Aqua Security can be deployed across all GKE or GKE On-Prem, and still have the desired granular control required depending on the type of resource that is needed to be secured. By using Config Management to control the deployment and configuration of Aqua Security, we […]
Latest Aqua release also introduces advanced runtime protection for serverless applications Boston, MA and Tel Aviv, Israel – 18 June 2019 – Aqua Security, the market leader in protecting container-based, serverless and cloud native applications, announced today version 4.2 of its cloud native security platform (Aqua CSP). In April this year, Aqua announced that it […]
Kubernetes users often ask me what they need to do to determine whether their deployment is running and configured safely from a security perspective. The best answer is to hire someone to perform penetration testing, but that can get expensive. A quicker, cheaper option that can help you identify common configuration issues is to use the open-source, do-it-yourself penetration […]
The 2019 Container Adoption Survey reveals some trends about containers and what organizations use them for, and want from the technology.