You’ll hear open source project maintainers and developers share what they love about the Go language and its community. Liz Rice of Aqua came to Gophercon to teach a workshop that introduced people to the concepts behind containers. She also recently became a Google developer expert in Go, which certifies her as someone creating interesting …
“LIVE from LondonGophers as part of GopherCon UK! Mat Ryer, and Mark Bates were joined by Liz Rice of Aqua Security, Kat Zień, Gautam Rege to talk about the magic in Go’s standard library.”
While serverless offers many benefits, it also possesses some significant drawbacks. “Since there are no performance SLAs in serverless functions, they aren’t typically used for high-performance, stateful applications,” said Amir Jerbi, co-founder and CTO of serverless and container software provider Aqua Security. Also, breaking code into small pieces “creates an architectural and design overhead that requires both effort and knowledge that …
Continuous Integration (CI) “This technique continuously merges source code updates into one mainline to prevent merge conflicts by integrating code from different developers as soon as it’s available. It creates a real-time window into the current state of the software system and quality measurements, enabling constant engagement of all DevOps team members. For security teams, CI …
Aqua Security provides customers with a solution for securing containerized applications from build to runtime on VMware Enterprise PKS and Pivotal PKS August 27, 2019 — Aqua Security, the leading platform provider for securing container-based, serverless, and cloud native applications, today announced that the company’s flagship platform, Aqua CSP, is available on VMware Cloud Marketplace™. …
The process for creating a Secret is also relatively simple. Korren from Aqua Security describes it thusly, and following along can also help illuminate the purpose and benefits: “The process is that a trusted person or source defines a Secret by creating a logical name and entering the sensitive data,” Korren explains. “From then on, …
“Software that’s as complex and as extensive as Kubernetes is bound to have vulnerabilities,” wrote Rani Osnat, Vice President of Product Marketing at Aqua Security, in an email to SDxCentral. “Taking the initiative to perform an extensive third-party security audit … is absolutely the right thing to do in order to get ahead of having …
The multi-cloud approach is also shifting from ad hoc to intentional in more companies. Amir Jerbi, CTO and cofounder at Aqua Security, summed this up well for us recently: “Multi-cloud has become a strategic initiative for many enterprises, large and small.”