Aqua News

Contact Aqua PR

Aqua Security Joins the Microsoft Enterprise Cloud Alliance

August 24, 2017

Certified by Microsoft, Aqua’s Platform Delivers Cloud-Native, Full-Lifecycle Security to Enterprises Using Containers to Build and Run Applications on Microsoft Azure 24 August, 2017 –   Aqua Security, a leading provider of container security solutions, today announced it has joined the Microsoft Enterprise Cloud Alliance (ECA) Partner Program.  Aqua’s membership in the ECA enables enterprise customers …

Read more

Are Your Containers Secure? An Interview With Aqua Security

August 24, 2017

Zone Leader, John Vester, spends time with the research team at Aqua Security – in the first of two articles related to container security.

Read more

‘Software containers’ are improving security of cloud computing

August 22, 2017

Baking in security early in the development process reduces risk, fosters collaborative culture

Read more

Aqua Security Logo

Container & DevSecOps Digest | August: Azure Container Instances, Docker Developer as Attack Vector and PII Protection in Container Environment

August 9, 2017

This month, read all about our Black Hat USA 2017 talk where we presented onstage a novel attack on Docker developers; Learn why we are so excited about the new Azure Container Instances and Join our upcoming webinar on securing Kubernetes environments.

Read more

Aqua Security Logo

Aqua Security Recognized by CRN as 2017 Emerging Vendor in Security

August 1, 2017

New Aqua Guide Outlines Controls to Drive PCI Compliance for Applications Developed and Run on Containers  

Read more

How to Keep Container Secrets Secret

July 31, 2017

Keeping secrets secret in container-based applications is complex and challenging, but far from hopeless

Read more

Malware? In my Docker container? It’s more common than you think

July 28, 2017

Researchers say software prisons can hide nasty attack payloads

Read more

Container Security Platform

Aqua Security Reveals Developer Security Risks With Docker Containers

July 28, 2017

In a Black Hat session, researchers outline an attack scenario aimed against developers that could put them at risk of exploitation.

Read more